CyberTalk

Exclusive: The top Kubernetes security considerations

Yeshwant Kamat, Cloud Security Architect, Check Point Software

Yeshwant Kamat advises customers on Multi Cloud Security- CSPM, CWPP, and Cloud Intelligence through Check Point’s CloudGuard platform. He is an AWS certified solution architect, AWS Certified security specialist and a Certified Kubernetes Administrator. Prior to this, he worked with Middleware and financial services, primarily on digital transformation initiatives.

In this exclusive expert interview, get premium insights into Kubernetes security considerations. This is information that you won’t want to miss.

For those who may not be familiar, can you share a bit about the importance of containers?

Containers are executable software units that include application code, libraries and dependencies packaged in common ways so it can be portable and can run anywhere. Containers help development teams remain agile, deploy efficiently, and scale.

Containers are a great fit for transitioning apps from past monolithic architectures to a modern micro services-based architecture. It is much easier to run containers on-premise or in public clouds. This allows for portable workloads and a multi-cloud strategy. Finally, with the availability of container orchestrators such as Kubernetes, containers are easy to manage and scale for production applications.

Disadvantages of cloud container orchestration use?

Container orchestration tools such as Kubernetes are designed for web scale applications. They introduce complexity for simple applications.

Initial ramp-up time and cost could be high. Support life cycle and the need to keep Kubernetes infrastructure updated introduces additional operational overhead.

What are the main cloud container orchestration security challenges that teams are contending with?

Containers and orchestration tools, such as Kubernetes, provide a lot of agility. However, securing them can be complex to manage. Some of the challenges organizations are dealing with today are:

How can organizations conquer cloud container (K8s) security?

CNCF recommends a layered approach to cloud native security. Risk has to be carefully managed in each area, whether it’s the underlying cloud (or on prem if you are running on prem), cluster, container and your code.

Anything else that you wish to share with the Cyber Talk audience?

Container orchestration adoption has increasingly become mainstream in enterprises. While adopting containers has huge benefits, the challenge now is to manage the risks of this new, agile landscape by using a cloud native posture management and container security solution.

If you’d like to receive more thought leadership content like this, sign up for the Cyber Talk newsletter here.

Exit mobile version