While revolutionizing the world of DevOps, the advent of container orchestration platforms like Kubernetes (K8s) has increased complexity and security challenges with its deployment and maintenance.
The Cymulate Threat Research Group has put major cloud providers’ security solutions to the test to see how effective they are at detecting and defending against simulated Kubernetes-based attack vectors.
In this report, see the methodologies, results, and recommendations from our research team to optimize the security controls of these major platforms.