/
Zero Trust Segmentation

Containers Security: An Essential Guide to Protecting Kubernetes

The modern cybersecurity landscape is swamped with new threats. Breaches are inevitable. It’s not a question of if but when you will be breached.

This means you can’t assume there’s any environment in your network that’s secure against threats. Containers are an increasingly popular target for attackers. While they’re a powerful DevOps tool, they bring unique security challenges, especially when layered onto other infrastructures.  

In this post, I’ll explain why you need to pay attention to containers security and how Illumio can help you secure your Kubernetes environments.

Containers aren't secure by default

Containers are typically managed by Kubernetes or OpenShift. Given their dynamic and short-lived nature, many assume that Kubernetes environments are less susceptible to threats. This simply isn’t true.

The security misconceptions about containers mirror the early days of VMs, where the same assumption was quickly proven wrong. Containers face their own set of security threats just like any other environment. Attackers breach containers with familiar goals in mind, such as financial gain, data espionage, infrastructure disruption, cryptomining, and botnet deployment for DDoS attacks.

Kubernetes faces several unique challenges in securing a cluster:

Network security challenges with Kubernetes at runtime
Kubernetes has many risks if its security isn’t addressed proactively.

The security risk around containers has been proven time and again:

  • Siloscape, Hildegard, and cr8escape malware use a technique called thread impersonation to breach a network via containers. They don’t target the Kubernetes cluster directly. Instead, they use the cluster to “escape” down to the underlying node and execute malicious code from there. This can disrupt the infrastructure, potentially bringing down the entire hosted Kubernetes cluster from below.
  • Kinsging malware looks for common PostgreSQL server misconfigurations in containers which it uses to deploy additional pods for executing malicious cryptomining code. While this malware doesn’t extract data, it uses the cluster’s resources for free which increases the owner’s costs.
  • Supply chain attacks like SolarWinds and CodeCov infiltrated Kubernetes clusters through external code repositories which bypassed traditional security measures.  

How does malware spread in Kubernetes?

All cyber threats have one thing in common: They want to move. Attackers aim to spread laterally to other resources once they enter the environment, eventually reaching their target.  

Malware spreads by taking advantage of human behavior or open ports, no matter the environment.

DevSecOps challenges with Kubernetes at runtime
All malware wants to move – and they all move the same way.

Unfortunately, people are the weakest link in cybersecurity. Regardless of their training, users may inadvertently click risky links, allowing malware to enter into the network. Once inside, malware scans for open ports to spread to other workloads.  

Malware traditionally uses open RDP, SSH, or SMB ports to deliver payloads to other workloads. Similarly, Kubernetes clusters often have open ports used by NodePort and Kubelet which make it easy for attackers to spread through Kubernetes workloads.  

Protecting Kubernetes: Combine microsegmentation with threat detection

The cybersecurity industry has traditionally taken a detect-and-response approach. Threat-hunting detection tools monitor workloads and applications for unusual behavior. If they find something malicious, security teams then work to eradicate the threat.  

But no matter how fast these detection tools are, today’s threats can spread faster. Even worse, once a breach has been detected, it likely has already spread through the environment. Organizations can’t expect detection tools to be 100% effective.  

We know that breaches spread between workloads over open ports. This means we don’t need to understand the intent of a threat to prevent it from spreading. It's much more effective to monitor and enforce segments first.  

By restricting communication between workloads, you prevent threats from spreading regardless of their intent. And you give your detection tool time to identify the threat.

For example, if someone is trying to break down the door to your house, you don’t first ask them if they’re a criminal and then decide to lock your door or not. You lock the door first and ask questions later.

Segmentation is foundational to any security architecture. Rather than wasting time determining a threat’s purpose, block its pathway immediately. This contains the breach and stops it from spreading further into the network.

Illumio’s approach to containing breaches in Kubernetes

Illumio assumes that a breach will eventually happen in any environment, including Kubernetes. There are several ways that the Illumio platform supports Kubernetes security.

Build proactive microsegmentation

By enforcing microsegmentation across all workloads, Illumio contains breaches at their entry point, preventing them from spreading throughout the network. This means organizations can survive an active breach without impacting their operations.

Automate detection and containment with third-party integrations

Illumio also integrates with third-party detection platforms like to automate the process of detecting and containing threats.  

If zero-day malware is using a port Illumio is allowing, these integrations will share this with the Illumio platform. In response, Illumio will automatically apply security policy to close security gaps and reduce risk before malicious actors can exploit them. 

This means you can implement granular segmentation controls based on real-time threat intelligence, reducing the attack surface and automatically containing breaches. 

Simplify Kubernetes DevSecOps  

Security operations in Kubernetes require security policy to be part of automation workflows used during containerized development cycles.  

With Illumio, you can get Kubernetes visibility and workload enforcement within the same global workflow used across all environments.  

Contain breaches in Kubernetes with Illumio

Attackers want to spread everywhere — even in Kubernetes. And if you can't stop them from spreading, your organization could be tomorrow’s news headline.

Illumio can keep you out of the news by helping you contain breaches, reduce risk, and build resilience. Map traffic and contain breaches across your entire hybrid multi-cloud, inside and outside Kubernetes.  

Contact us today to learn how Illumio can contain breaches in your containers environments.

Related topics

No items found.

Related articles

5 Zero Trust Myths Busted by John Kindervag and Michael Farnum
Zero Trust Segmentation

5 Zero Trust Myths Busted by John Kindervag and Michael Farnum

Get insight from John Kindervag, creator of Zero Trust and Illumio chief evangelist, and Michael Farnum, advisory CISO at Trace3, about the most common Zero Trust myths they’re seeing in the industry and the truths behind them.

How Will You Get the Most Out of Black Hat USA 2015 and DEF CON 23?
Zero Trust Segmentation

How Will You Get the Most Out of Black Hat USA 2015 and DEF CON 23?

Black Hat and DEF CON have definitely grown from the early years, and even from when I last attended, seven years ago. The events are still an eclectic annual gathering of many security tribes, but the expo floor at Black Hat is now packed with vendor booths as well.

An Architect’s Guide to Deploying Microsegmentation: Building the Deployment Team
Zero Trust Segmentation

An Architect’s Guide to Deploying Microsegmentation: Building the Deployment Team

The best approach to deploying micro-segmentation involves assembling a cross-functional team.

How Illumio Builds Cohesive Security for Containers
Zero Trust Segmentation

How Illumio Builds Cohesive Security for Containers

Learn how Illumio enforces security policies and offers complete visibility within all environments – all in one platform.

How to Solve the Top 3 Challenges of Securing Containers and Kubernetes Environments
Zero Trust Segmentation

How to Solve the Top 3 Challenges of Securing Containers and Kubernetes Environments

Learn how to deploy consistent yet flexible security across ever-changing containers and Kubernetes environments.

Kubernetes Isn’t Immune to Ransomware – And How Illumio Can Help
Ransomware Containment

Kubernetes Isn’t Immune to Ransomware – And How Illumio Can Help

Learn why ransomware is a very real cybersecurity risk in Kubernetes that DevSecOps architects can't afford to ignore.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?