Kubernetes has become the de facto standard for deploying applications in the cloud as organizations run business-critical applications on Kubernetes K8 clusters hosted by leading cloud services providers Microsoft Azure, Amazon AWS, and the Google Cloud Platform (GCP).
In this research update, the Cymulate Threat Research Group decided to put the native security tools of each provider to the test against the types of attack techniques being used by threat actors to exploit K8 clusters. The native cloud security tools included:
* Azure Cloud Defender
* AWS GuardDuty
* GCP Command Center
The results of these security validation tests against the above native cloud security tools raise some concerns that your K8 cluster could get KO’d by a threat actor, which we believe is NOT OK.
To find out more, attend this informative session to learn about:
* The Cymulate Kubernetes research project
* Research results and detection rates for native cloud security tools
* Overview of the research findings
* Cymulate recommendations to better secure Kubernetes environments