Human error and misconfigurations primary source of Kubernetes security snafus, report says
StackRox, a provider of cloud-native, container and Kubernetes security, warned in its previous report that the security implications for Kubernetes were beginning to spill over to adoption – and the release of its updated winter study have proved the company right.
The paper, the winter edition of its State of Container and Kubernetes Security Report, was put together alongside 451 Research and polled more than 500 industry professionals.
94% of those polled said they had experienced security incidents in their container environments during the previous 12 months. As is frequently the case with other cloud security snafus, human error – in this case misconfigured containers – can be found as a root cause, a trend which StackRox said was ‘alarmingly common.’
More than two thirds (69%) of those polled said they had experienced a misconfiguration incident; just over a quarter (27%) found a security incident during runtime, with a similar number (24%0 having a major vulnerability to remediate.
86% of respondents said they were running containerised applications in Kubernetes – the same number as in the spring survey. However, the way Kubernetes is being used is changing rapidly, as more organisations put trust in the hyperscalers managing their workloads. Just over a third (35%) of respondents said they manage Kubernetes directly today – down from 44% six months ago – with more respondents (37%) using Amazon EKS. More than one in five (21%) say they use Azure AKS and Google GKE, with both representing a significant increase from spring.
In a similar theme, maturation is increasing in terms of cloud-only environments. While hybrid deployments remain more popular – 46% compared to 40% for cloud-only – it represented a big drop from the 53% who cited it six months ago. For cloud-only, organisations remain predominantly trusting a single cloud, although multi-cloud deployments are becoming more popular.
The previous report, issued in July, gave more of a general warning on container security. Six months prior, two in three organisations said they had more than 10% of their applications containerised – yet two in five were concerned their container strategy did not sufficiently invest in security. This time around, only 28% of organisations polled said they had fewer than 10% of their containers running in production – down from 39% last time.
“One of the most consistent results we get on our own surveys of DevOps and cloud-native security technologies is how important security is for these environments,” said Fernando Montenegro, principal analyst at 451 Research. “It is interesting to see how this observation fits well with the StackRox study, highlighting the need for both engineering and security professionals to have visibility and properly deploy security controls and practices for container and Kubernetes environments.”
You can read the full report here (email required).
Interested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases? Attend the Cyber Security & Cloud Expo World Series with upcoming events in Silicon Valley, London and Amsterdam to learn more.
- » Cloud IT infrastructure spending stormed back in Q4 to secure modest yearly growth, says IDC
- » Marriott reported another data breach: Why cyber risk assessment is important
- » Cloud complexity and ‘terrifying’ IoT means organisations’ asset visibility is worsening – report
- » Realising the impact of unsecured container deployments: A guide
- » Five key takeaways from RSA Conference 2020: Cloud SIEM, Zero Trust, API-based security, and more