Category: Security, Kubernetes, firewall

In a never-ending game of cat and mouse, threat actors are exploiting, controlling and maintaining persistent access in compromised cloud infrastructure. While cloud practitioners are armed with best-in-class knowledge, support and security practices, it is statistically impossible to have a common security posture for all cloud instances worldwide.

A considerable amount of trust is placed in cloud providers to configure, patch and manage Kubernetes security on our behalf.

In hindsight, this could have been preventable through continuous auditing of managed environments and early detection of security gaps.

Early detection of anomalous behavior is paramount and can go a long way in speeding detection, investigation and mitigation of threats.

Related Articles