Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
securing_and_monitoring_your_kubernates_cluster [2019/09/07 09:04]
root
securing_and_monitoring_your_kubernates_cluster [2019/09/07 09:05] (current)
root [Overview]
Line 4: Line 4:
 Kubernates is one of the new tools to provide the enterprise with agility allowing a new tempo of service introduction and upgrade as well as a new level of service scaling. However with all new tools comes new challenges. The dynamic nature of kubernates services makes traditional static monitoring of performance/​errors and security difficult. ​ Kubernates is one of the new tools to provide the enterprise with agility allowing a new tempo of service introduction and upgrade as well as a new level of service scaling. However with all new tools comes new challenges. The dynamic nature of kubernates services makes traditional static monitoring of performance/​errors and security difficult. ​
  
-A real world example Tesla Kubernetes cluster was compromised because the administrative console was not password protected. Once an attacker gains admin privilege of the Kubernetes cluster, he or she can discover all the services that are running, get into every pod to access processes, inspect files and tokens, and steal secrets managed by the Kubernetes cluster. ​([[https://​neuvector.com/​container-security/​cryptojacking-crypto-mining-tesla-kubernetes-jenkins-exploits/​ | reference]] ​)+A real world example Tesla Kubernetes cluster was compromised because the administrative console was not password protected. Once an attacker gains admin privilege of the Kubernetes cluster, he or she can discover all the services that are running, get into every pod to access processes, inspect files and tokens, and steal secrets managed by the Kubernetes cluster. ​[[https://​neuvector.com/​container-security/​cryptojacking-crypto-mining-tesla-kubernetes-jenkins-exploits/​ | reference]] ​]
  
 Not only did the attacker locate Tesla’s Amazon S3 bucket credentials,​ but they also started a crypto mining script within one of the pods.  Not only did the attacker locate Tesla’s Amazon S3 bucket credentials,​ but they also started a crypto mining script within one of the pods. 
 
securing_and_monitoring_your_kubernates_cluster.txt · Last modified: 2019/09/07 09:05 by root
 
RSS - 200 © CrosswireDigitialMedia Ltd