Native Cloud Defense Mechanisms Vs. Kubernetes Attacks
Kubernetes has become the de facto standard for deploying applications in the cloud as organizations run business-critical applications and workloads on Kubernetes K8 clusters hosted by leading cloud services providers Microsoft Azure, Amazon AWS and Google Cloud.
In this research update, the Cymulate Threat Research Group decided to put the native security tools of each provider to the test against the types of attack techniques being used by threat actors to exploit K8 clusters. The results of these tests may surprise you.
Download the Kubernetes Research Report to see the results of our validation tests and to learn more about:
- The Cymulate Kubernetes research project
- Research results and detection rates for native cloud security tools
- Overview of the research findings
- Cymulate recommendations to better secure Kubernetes environments