×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!
   

Penetrating Kubernetes 101

April 7, 2020

This this detailed whitepaper covers the security research the CyberArk Labs performed on Kubernetes and best practices to protect your environment.

As the pace of life accelerates, we spend less time waiting or in downtime. Kubernetes offers something similar to our life with technology. It is a container orchestration platform that offers an easy, automated way to establish and manage a containerized app network.

As the Kubernetes system becomes more prevalent in our “technological life,” we expect that we will encounter this system more and more.

Our responsibility as penetration testers and researchers is to take care of the security aspect of Kubernetes. We need to make sure it is deployed securely and that there are no vulnerabilities putting the whole system at risk.

This whitepaper is aimed at helping security personnel get an idea of the risks that might exist in the Kubernetes system and can serve as an excellent methodology document for penetration testers going up against the Kubernetes system, whether they are engaging in white-, black- or gray-box testing.

This whitepaper is built around the three vectors that pentesters should check first.

Previous Flipbook
Five Ways to Strengthen AWS Managed Services Security with CyberArk
Five Ways to Strengthen AWS Managed Services Security with CyberArk

Learn five ways on how CyberArk can help reduce privileged access security risk, improve visibility and con...

Next Flipbook
The CISO View - Protecting Privileged Access in Robotic Process Automation
The CISO View - Protecting Privileged Access in Robotic Process Automation

The 4th annual CISO View Report focuses on Robotic Process Automation (RPA). RPA brings a new and attractiv...