XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices

Kubernetes is an open-source software for automating management of computerized services. Organizations, such as IBM, Capital One and Adidas use Kubernetes to deploy and manage their containers, and have reported benefits related to deployment frequency. Despite reported benefits, Kubernetes deployments are susceptible to security vulnerabilities, such as those that occurred at Tesla in 2018. A systematization of Kubernetes security practices can help practitioners mitigate vulnerabilities in their Kubernetes deployments. The goal of this paper is to help practitioners in securing their Kubernetes installations through a systematization of knowledge related to Kubernetes security practices. We systematize knowledge by applying qualitative analysis on 104 Internet artifacts. We identify 11 security practices that include (i) implementation of role-based access control (RBAC) authorization to provide least privilege, (ii) applying security patches to keep Kubernetes updated, and (iii) implementing pod and network specific security policies.

READ FULL TEXT
research
10/20/2022

PREPRINT: Do OpenSSF Scorecard Practices Contribute to Fewer Vulnerabilities?

Due to the ever-increasing security breaches, practitioners are motivate...
research
12/30/2021

An Empirical Study of Security Practices for Microservices Systems

Despite the numerous benefits of microservices systems, security has bee...
research
11/13/2022

Benefits, Challenges, and Research Topics: A Multi-vocal Literature Review of Kubernetes

Context: Kubernetes is an open source software that helps in automated d...
research
05/28/2022

Towards a Security Stress-Test for Cloud Configurations

Securing cloud configurations is an elusive task, which is left up to sy...
research
06/01/2020

Security Smells in Android

The ubiquity of smartphones, and their very broad capabilities and usage...
research
08/07/2023

Exploring Security Practices in Infrastructure as Code: An Empirical Study

Cloud computing has become popular thanks to the widespread use of Infra...
research
03/04/2020

Risk Management Practices in Information Security: Exploring the Status Quo in the DACH Region

Information security management aims at ensuring proper protection of in...

Please sign up or login with your details

Forgot password? Click here to reset