Analyze Configurations of Containerized Data and Applications to Avoid Unintended Exposure
Containerized applications and Amazon Elastic Kubernetes Service (EKS) allow software developers to rapidly develop and deploy new capabilities, but require new types of security measures–implemented by development teams–that:
- Control communications between pods and clusters
- Manage services and user/group accounts access
- Define custom policies that are specific to the application deployment
Given this additional responsibility for developers and overall complexity of deployment environments, misconfigured controls are too common. Gartner estimates that by 2023, 99% of cloud security failures are caused by misconfigurations from the customer.