Shrinking Your Threat Surface as Kubernetes Adoption Skyrockets
June 12, 2024

James Maskelony
Expel

Kubernetes has become increasingly ubiquitous as organizations across the globe pivot to embrace a more container-based model for application development and code deployment. Today, 85% of organizations say they use Kubernetes, with nearly a third of those indicating they fully transitioned their applications to the system.

For developers and engineers, Kubernetes represents a significant — and welcome — shift. Rather than building larger and larger applications, Kubernetes allows them to scale horizontally, adding more versions of the application where necessary and simplifying the process of code distribution and deployment. This leaves developers free to focus on mission-critical tasks, rather than constantly fretting over administrative concerns like managing upkeep, adding additional servers, or monitoring for outages.

Unfortunately, Kubernetes also comes with drawbacks — mainly in the form of security vulnerabilities that most businesses have yet to fully wrap their minds around. The benefits of Kubernetes have led to something of a gold rush, but soaring Kubernetes adoption rates have eclipsed the ability of more organizations to secure their containers effectively. Using Kubernetes as a foothold, attackers are often able to spread across different systems and devices — and security analysts don't always have the tools they need to detect these incursions, let alone stop them. As the shift toward Kubernetes continues, organizations need to understand how to effectively protect their environments — or risk becoming the next major victim of a breach.

How Attackers Can Exploit Kubernetes Environments

One of the biggest problems when it comes to securing Kubernetes environments is the simple lack of expertise. Because Kubernetes is still (relatively) new, there are only so many security operators who understand the ins and outs of protecting the system — and those who do are in high demand.

Well-resourced organizations with strong in-house security resources may be able to attract and retain those experts, but this won't be an option for everyone. Small and mid-sized businesses (SMBs) in particular may not have the necessary resources to build and maintain that level of in-house expertise, forcing them to look to outside experts and partners to supplement their knowledge and capabilities.

There are multiple ways adversaries can attack Kubernetes environments, and they often involve exploiting this knowledge gap. Accidental misconfigurations are common, and a simple mistake like granting unnecessary permissions to an account or user can create an easy opening for attackers. Third-party attacks have also become increasingly common across all elements of security, and Kubernetes could be used to proliferate a compromised element throughout the organization. There are also attackers who target Kubernetes directly, manipulating applications to run malicious commands that grant them access to secure environments. Currently, our observation of these attacks is limited to more sophisticated threat actors (or skilled red teamers), but this is likely to change as attackers become increasingly familiar with the Kubernetes landscape.

As with any cyberattack, attacks targeting Kubernetes can be devastating to an organization. While there are damaging activities an attacker might perform within Kubernetes environments themselves, gaining access via Kubernetes often serves as a stepping-stone to the broader network. The danger isn't always what attackers can do with Kubernetes — it's where they might go from there.

Initial Steps to Lock Down Kubernetes Environments

The first — and arguably most important — step an organization can take is to make use of existing security guidelines and information sharing opportunities. Security teams across the globe are strapped for resources, but helpful security guidelines and threat intelligence data are surprisingly easy to come by.

Established advisory bodies like MITRE publish free security frameworks, and there are tools that can help organizations map those recommendations directly onto their Kubernetes environments. That makes it much easier for businesses to understand the potential attack paths adversaries might take when accessing their cloud environments, helping security teams not only track attackers but also anticipate the movements they are most likely to make and the tactics they are most likely to use. It's also a good idea to make sure developers and security teams have a close working relationship so that security professionals understand what "normal" looks like. This can help them avoid falsely flagging "suspicious" behavior that is actually just benign developer activity.

A lot of ink has been spilled on the idea of "shifting left," and for good reason: embracing a "shift left" mentality is a critical way to ensure that necessary security measures are introduced earlier in the application development lifecycle. Rather than attempting to shoehorn security measures into an application after the fact, organizations should be seeking to identify potential vulnerabilities during the development process and implementing appropriate mitigation measures as a matter of course. Identifying vulnerabilities early helps reduce the burden on developers — not to mention reducing the potential for costly mistakes.

Finally, preventing malicious initial access is one of the most important and effective ways to protect Kubernetes environments. This requires organizations to stitch together the authentication logs from its cloud identity and access management (IAM) service or other authentication provider along with the API activity logs from the Kubernetes system. Authentication flows happen outside the Kubernetes cluster and won't be logged there — but once authenticated, security teams should be able to identify authorization decisions and follow up on activities recorded in the Kubernetes audit logs. If suspicious activity or unauthorized access attempts are detected in one or both of these areas, security teams should have a good idea where to look for attackers and where additional protections may be needed in the future.

Taking the First Steps Toward Kubernetes Security

The emergence of Kubernetes as a developer-friendly system for application development has been a significant boon for many businesses, but failure to implement appropriate security capabilities has rendered these environments — and the organizations that use them — vulnerable to attack. While Kubernetes expertise is not always easy to come by for businesses, there are simple and immediate steps that most can take to begin protecting their Kubernetes environments more effectively. By making use of publicly available resources, embracing a shift-left mentality, and implementing stronger authentication capabilities, today's organizations can avoid making their Kubernetes environments an easy target for attackers.

James Maskelony is Senior Detection & Response Engineer at Expel
Share this

Industry News

January 30, 2025

OutSystems announced the general availability (GA) of Mentor on OutSystems Developer Cloud (ODC).

January 30, 2025

Kurrent announced availability of public internet access on its managed service, Kurrent Cloud, streamlining the connectivity process and empowering developers with ease of use.

January 29, 2025

MacStadium highlighted its major enterprise partnerships and technical innovations over the past year. This momentum underscores MacStadium’s commitment to innovation, customer success and leadership in the Apple enterprise ecosystem as the company prepares for continued expansion in the coming months.

January 29, 2025

Traefik Labs announced the integration of its Traefik Proxy with the Nutanix Kubernetes Platform® (NKP) solution.

January 28, 2025

Perforce Software announced the launch of AI Validation, a new capability within its Perfecto continuous testing platform for web and mobile applications.

January 28, 2025

Mirantis announced the launch of Rockoon, an open-source project that simplifies OpenStack management on Kubernetes.

January 28, 2025

Endor Labs announced a new feature, AI Model Discovery, enabling organizations to discover the AI models already in use across their applications, and to set and enforce security policies over which models are permitted.

January 27, 2025

Qt Group is launching Qt AI Assistant, an experimental tool for streamlining cross-platform user interface (UI) development.

January 27, 2025

Sonatype announced its integration with Buy with AWS, a new feature now available through AWS Marketplace.

January 27, 2025

Endor Labs, Aikido Security, Arnica, Amplify, Kodem, Legit, Mobb and Orca Security have launched Opengrep to ensure static code analysis remains truly open, accessible and innovative for everyone:

January 23, 2025

Progress announced the launch of Progress Data Cloud, a managed Data Platform as a Service designed to simplify enterprise data and artificial intelligence (AI) operations in the cloud.

January 23, 2025

Sonar announced the release of its latest Long-Term Active (LTA) version, SonarQube Server 2025 Release 1 (2025.1).

January 23, 2025

Idera announced the launch of Sembi, a multi-brand entity created to unify its premier software quality and security solutions under a single umbrella.

January 22, 2025

Postman announced the Postman AI Agent Builder, a suite empowering developers to quickly design, test, and deploy intelligent agents by combining LLMs, APIs, and workflows into a unified solution.

January 22, 2025

The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, announced the graduation of CubeFS.