In H1 2024, organizations benefiting from using Kubernetes development environments and a cloud security platform betrayed some high-risk cloud vulnerability habits…

Other findings

Fourth, based on these findings of H1 2024, four mitigation practices have been highlighted for the improved safeguarding of Kubernetes environments in general:

  1. Limit Kubernetes API exposure: Ensure that Kubernetes API servers are not exposed to the public internet, through firewalls and network segmentation.
  2. Reduce running containers in Privileged Mode: Adhere to security best practices outlined in the CIS Kubernetes Benchmark and NIST guidelines to limit container access to host resources.
  3. Harden role-based access control: Audit and restrict the use of cluster-admin roles regularly. Replace overly permissive role bindings with granular permissions that adhere to the principle of least privilege.
  4. Audit Kubernetes configurations regularly: This can facilitate detection and mitigation of any misconfigurations or unnecessary exposures. Disable anonymous access to the Kubelet API and ensure that all communications within the cluster are encrypted..

According to Ari Eitan, Research Director, Tenable, the firm whose cloud research arm performed the H1 2024 data analysis of customer cloud risks, organizations employing the container technology should prioritize security, “particularly by closing exposure gaps and enforcing strict access controls. Proactive measures today will protect organizations from becoming tomorrow’s headline breaches.”