Attackers Take Aim At Kubernetes & Software Supply Chain

A new report from Aqua Security has found that attackers are focused more on the cloud and using sophisticated tactics to aim at Kubernetes and the software supply chain. Seeing as the Kubernetes is the thing at the moment, that means that your approach has to change accordingly. Sitaram Iyer, Global Security Architect, Venafi had this to say:  

“As the popularity of Kubernetes has risen, so too has the severity and frequency of attacks on them, as cybercriminals have realised that Kubernetes can be vulnerable. The cybercrime group TeamTNT has been a real exponent of this, having compromised more than 50,000 Kubernetes clusters over the last few years, spreading malware at will, and eventually launching a cryptominer.“With the pace of innovation in cloud rocketing, so too is the number of machine identities in use for the deployed applications. Many of these applications will be spun up and down in a matter of seconds and are highly ephemeral . However, each application needs to be given an identity, which must be managed throughout its lifecycle. Enterprises are struggling to issue and manage these identities at cloud speed and scale. The result is new security risks due to mismanagement of machine identities.”

“Zero trust is vital to protecting organisations against attacks targeting Kubernetes. Its important businesses stop blindly trusting everything within their build environments and instead adopt a stance whereby every component of the build pipeline is proactively challenged.

“Automated machine identity is crucial to ensuring companies don’t kill the speed of development whilst deploying this zero trust model. Through automation, organisations can ensure the dynamic nature of cloud-native environments remain secure, as manually checking the provenance of every component of a build pipeline would take weeks. Developers need solutions that enable – instead of hinder – speed and security.”

If Kubernetes is your thing, I’d be taking Mr. Iyer’s advice as clearly threat actors are targeting you.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: