Research Webinar: Native Cloud Defenses vs Kubernetes Attacks

Logo
Presented by

Paul Ashwood, Sr Product Marketing Manager and Ilan Kalendarov, Security Researcher

About this talk

Kubernetes has become the de facto standard for deploying applications in the cloud as organizations run business-critical applications on Kubernetes K8 clusters hosted by leading cloud services providers Microsoft Azure, Amazon AWS, and the Google Cloud Platform (GCP). In this research update, the Cymulate Threat Research Group decided to put the native security tools of each provider to the test against the types of attack techniques being used by threat actors to exploit K8 clusters. The native cloud security tools included: * Azure Cloud Defender * AWS GuardDuty * GCP Command Center The results of these security validation tests against the above native cloud security tools raise some concerns that your K8 cluster could get KO’d by a threat actor, which we believe is NOT OK. To find out more, attend this informative session to learn about: * The Cymulate Kubernetes research project * Research results and detection rates for native cloud security tools * Overview of the research findings * Cymulate recommendations to better secure Kubernetes environments
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (121)
Subscribers (16378)
Cymulate exposure management and security validation drives continuous threat exposure management programs and supports both the technical and business requirements of scoping, discovery, prioritization, validation, and mobilization.