Kubernetes has gained amazing traction as a software tool to deploy and manage application containers automatically. But malicious actors know a vulnerable target when they see one, and Kubernetes is no exception.
This July, we learned that threat actors were making large-scale, cryptocurrency mining attacks against Kubernetes clusters.
Organizations running Kubernetes in their on-premises, hybrid cloud, or public cloud environments should take these steps to ensure their containerized workloads and data are protected.
Kubernetes has made container management and orchestration much more streamlined and automated. Unfortunately, cybercriminals are taking advantage of the ease to adopt, open-source nature of Kubernetes to execute more complex and malicious attacks against containers to steal users’ information or gain access to a company’s database. Taking the steps listed above will help organizations keep their Kubernetes-based containerized applications and data protected and recoverable.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.