Analyze Configurations of Containerized Data and Applications to Avoid Unintended Exposure
Containerized applications, Amazon Elastic Kubernetes Service (EKS), Microsoft Azure Kubernetes Services (AKS) and Google Kubernetes Engine (GKE) allow software developers to rapidly develop and deploy new capabilities, but require new types of security measures–such as:
- Understanding your Kubernetes Inventory footprint
- Identifying if namespaces have adequate security controls
- Determining if services and user/group accounts access have excessive privileges
- Seeing if access to clusters/namespaces meets organizational mandates