TY - GEN
T1 - Securing Kubernetes
T2 - 9th International Conference on Cyber Security, Privacy in Communication Networks, ICCS 2023
AU - Lawrence, John Jeyasekaran
AU - Prakash, Edmond
AU - Hewage, Chaminda
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.
PY - 2024/9/18
Y1 - 2024/9/18
N2 - The idea of containerization has gripped the entire IT industry. All kinds of enterprise, embedded, and cloud applications are methodically containerized, curated, and deposited in public and private container image repositories. Such an arrangement facilitates agile and accelerated software engineering. However, for the containerization paradigm to achieve the widely articulated success, there is a need for container orchestration platform solutions for smoothly tackling the container life-cycle management tasks. Kubernetes is the market-leading, modular, and multifaceted platform for simplifying and streamlining the aspects of automated containerized applications deployment and management. Kubernetes is made up of many moving parts and hence their local as well as remote interactions are beset with security challenges. Building and sustaining Kubernetes (K8s) clusters for running and managing containerized applications in a secure and safe manner is the need of the hour. In this paper, we illustrate the various security vulnerabilities of K8s clusters and how they can be surmounted through security enforcement processes, practices, and products.
AB - The idea of containerization has gripped the entire IT industry. All kinds of enterprise, embedded, and cloud applications are methodically containerized, curated, and deposited in public and private container image repositories. Such an arrangement facilitates agile and accelerated software engineering. However, for the containerization paradigm to achieve the widely articulated success, there is a need for container orchestration platform solutions for smoothly tackling the container life-cycle management tasks. Kubernetes is the market-leading, modular, and multifaceted platform for simplifying and streamlining the aspects of automated containerized applications deployment and management. Kubernetes is made up of many moving parts and hence their local as well as remote interactions are beset with security challenges. Building and sustaining Kubernetes (K8s) clusters for running and managing containerized applications in a secure and safe manner is the need of the hour. In this paper, we illustrate the various security vulnerabilities of K8s clusters and how they can be surmounted through security enforcement processes, practices, and products.
KW - Cloud security
KW - Containerization
KW - Kubernetes
UR - http://www.scopus.com/inward/record.url?scp=85205113393&partnerID=8YFLogxK
U2 - 10.1007/978-981-97-3973-8_9
DO - 10.1007/978-981-97-3973-8_9
M3 - Conference contribution
AN - SCOPUS:85205113393
SN - 9789819739721
T3 - Lecture Notes in Networks and Systems
SP - 127
EP - 152
BT - AI Applications in Cyber Security and Communication Networks - Proceedings of 9th International Conference on Cyber Security, Privacy in Communication Networks ICCS 2023
A2 - Hewage, Chaminda
A2 - Nawaf, Liqaa
A2 - Kesswani, Nishtha
PB - Springer Science and Business Media Deutschland GmbH
Y2 - 9 December 2023 through 10 December 2023
ER -