Parasoft is accelerating the release of its C/C++test 2025.1 solution, following the just-published MISRA C:2025 coding standard.
Kubernetes has become increasingly ubiquitous as organizations across the globe pivot to embrace a more container-based model for application development and code deployment. Today, 85% of organizations say they use Kubernetes, with nearly a third of those indicating they fully transitioned their applications to the system.
For developers and engineers, Kubernetes represents a significant — and welcome — shift. Rather than building larger and larger applications, Kubernetes allows them to scale horizontally, adding more versions of the application where necessary and simplifying the process of code distribution and deployment. This leaves developers free to focus on mission-critical tasks, rather than constantly fretting over administrative concerns like managing upkeep, adding additional servers, or monitoring for outages.
Unfortunately, Kubernetes also comes with drawbacks — mainly in the form of security vulnerabilities that most businesses have yet to fully wrap their minds around. The benefits of Kubernetes have led to something of a gold rush, but soaring Kubernetes adoption rates have eclipsed the ability of more organizations to secure their containers effectively. Using Kubernetes as a foothold, attackers are often able to spread across different systems and devices — and security analysts don't always have the tools they need to detect these incursions, let alone stop them. As the shift toward Kubernetes continues, organizations need to understand how to effectively protect their environments — or risk becoming the next major victim of a breach.
How Attackers Can Exploit Kubernetes Environments
One of the biggest problems when it comes to securing Kubernetes environments is the simple lack of expertise. Because Kubernetes is still (relatively) new, there are only so many security operators who understand the ins and outs of protecting the system — and those who do are in high demand.
Well-resourced organizations with strong in-house security resources may be able to attract and retain those experts, but this won't be an option for everyone. Small and mid-sized businesses (SMBs) in particular may not have the necessary resources to build and maintain that level of in-house expertise, forcing them to look to outside experts and partners to supplement their knowledge and capabilities.
There are multiple ways adversaries can attack Kubernetes environments, and they often involve exploiting this knowledge gap. Accidental misconfigurations are common, and a simple mistake like granting unnecessary permissions to an account or user can create an easy opening for attackers. Third-party attacks have also become increasingly common across all elements of security, and Kubernetes could be used to proliferate a compromised element throughout the organization. There are also attackers who target Kubernetes directly, manipulating applications to run malicious commands that grant them access to secure environments. Currently, our observation of these attacks is limited to more sophisticated threat actors (or skilled red teamers), but this is likely to change as attackers become increasingly familiar with the Kubernetes landscape.
As with any cyberattack, attacks targeting Kubernetes can be devastating to an organization. While there are damaging activities an attacker might perform within Kubernetes environments themselves, gaining access via Kubernetes often serves as a stepping-stone to the broader network. The danger isn't always what attackers can do with Kubernetes — it's where they might go from there.
Initial Steps to Lock Down Kubernetes Environments
The first — and arguably most important — step an organization can take is to make use of existing security guidelines and information sharing opportunities. Security teams across the globe are strapped for resources, but helpful security guidelines and threat intelligence data are surprisingly easy to come by.
Established advisory bodies like MITRE publish free security frameworks, and there are tools that can help organizations map those recommendations directly onto their Kubernetes environments. That makes it much easier for businesses to understand the potential attack paths adversaries might take when accessing their cloud environments, helping security teams not only track attackers but also anticipate the movements they are most likely to make and the tactics they are most likely to use. It's also a good idea to make sure developers and security teams have a close working relationship so that security professionals understand what "normal" looks like. This can help them avoid falsely flagging "suspicious" behavior that is actually just benign developer activity.
A lot of ink has been spilled on the idea of "shifting left," and for good reason: embracing a "shift left" mentality is a critical way to ensure that necessary security measures are introduced earlier in the application development lifecycle. Rather than attempting to shoehorn security measures into an application after the fact, organizations should be seeking to identify potential vulnerabilities during the development process and implementing appropriate mitigation measures as a matter of course. Identifying vulnerabilities early helps reduce the burden on developers — not to mention reducing the potential for costly mistakes.
Finally, preventing malicious initial access is one of the most important and effective ways to protect Kubernetes environments. This requires organizations to stitch together the authentication logs from its cloud identity and access management (IAM) service or other authentication provider along with the API activity logs from the Kubernetes system. Authentication flows happen outside the Kubernetes cluster and won't be logged there — but once authenticated, security teams should be able to identify authorization decisions and follow up on activities recorded in the Kubernetes audit logs. If suspicious activity or unauthorized access attempts are detected in one or both of these areas, security teams should have a good idea where to look for attackers and where additional protections may be needed in the future.
Taking the First Steps Toward Kubernetes Security
The emergence of Kubernetes as a developer-friendly system for application development has been a significant boon for many businesses, but failure to implement appropriate security capabilities has rendered these environments — and the organizations that use them — vulnerable to attack. While Kubernetes expertise is not always easy to come by for businesses, there are simple and immediate steps that most can take to begin protecting their Kubernetes environments more effectively. By making use of publicly available resources, embracing a shift-left mentality, and implementing stronger authentication capabilities, today's organizations can avoid making their Kubernetes environments an easy target for attackers.
Industry News
GitHub is making GitHub Advanced Security (GHAS) more accessible for developers and teams of all sizes.
ArmorCode announced the enhanced ArmorCode Partner Program, highlighting its goal to achieve a 100 percent channel-first sales model.
Parasoft is showcasing its latest product innovations at embedded world Exhibition, booth 4-318, including new GenAI integration with Microsoft Visual Studio Code (VS Code) to optimize test automation of safety-critical applications while reducing development time, cost, and risk.
JFrog announced general availability of its integration with NVIDIA NIM microservices, part of the NVIDIA AI Enterprise software platform.
CloudCasa by Catalogic announce an integration with SUSE® Rancher Prime via a new Rancher Prime Extension.
MacStadium announced the extended availability of Orka Cluster 3.2, establishing the market’s first enterprise-grade macOS virtualization solution available across multiple deployment options.
JFrog is partnering with Hugging Face, host of a repository of public machine learning (ML) models — the Hugging Face Hub — designed to achieve more robust security scans and analysis forevery ML model in their library.
Copado launched DevOps Automation Agent on Salesforce's AgentExchange, a global ecosystem marketplace powered by AppExchange for leading partners building new third-party agents and agent actions for Agentforce.
Harness completed its merger with Traceable, effective March 4, 2025.
JFrog released JFrog ML, an MLOps solution as part of the JFrog Platform designed to enable development teams, data scientists and ML engineers to quickly develop and deploy enterprise-ready AI applications at scale.
Progress announced the addition of Web Application Firewall (WAF) functionality to Progress® MOVEit® Cloud managed file transfer (MFT) solution.
Couchbase launched Couchbase Edge Server, an offline-first, lightweight database server and sync solution designed to provide low latency data access, consolidation, storage and processing for applications in resource-constrained edge environments.
Sonatype announced end-to-end AI Software Composition Analysis (AI SCA) capabilities that enable enterprises to harness the full potential of AI.
Aviatrix® announced the launch of the Aviatrix Kubernetes Firewall.