Many companies struggle with security when adopting Kubernetes. Because Kubernetes and containers present a new approach for deploying applications, operations and security teams question whether the applications and data will be secure when they adopt microservices, containers, and Kubernetes. Many traditional security tools and processes no longer apply, while containers create new security blind spots and new attack surfaces, making visibility across containers and clusters an additional challenge.
Here are a few of the common mistakes:
Granting access to the host node
Assuming operations is aligned with the security
Running containers with known vulnerabilities
Download the paper to learn more about these and the two others.