/
Zero Trust Segmentation

Containers Security: An Essential Guide to Protecting Kubernetes

The modern cybersecurity landscape is swamped with new threats. Breaches are inevitable. It’s not a question of if but when you will be breached.

This means you can’t assume there’s any environment in your network that’s secure against threats. Containers are an increasingly popular target for attackers. While they’re a powerful DevOps tool, they bring unique security challenges, especially when layered onto other infrastructures.  

In this post, I’ll explain why you need to pay attention to containers security and how Illumio can help you secure your Kubernetes environments.

Containers aren't secure by default

Containers are typically managed by Kubernetes or OpenShift. Given their dynamic and short-lived nature, many assume that Kubernetes environments are less susceptible to threats. This simply isn’t true.

The security misconceptions about containers mirror the early days of VMs, where the same assumption was quickly proven wrong. Containers face their own set of security threats just like any other environment. Attackers breach containers with familiar goals in mind, such as financial gain, data espionage, infrastructure disruption, cryptomining, and botnet deployment for DDoS attacks.

Kubernetes faces several unique challenges in securing a cluster:

Network security challenges with Kubernetes at runtime
Kubernetes has many risks if its security isn’t addressed proactively.

The security risk around containers has been proven time and again:

  • Siloscape, Hildegard, and cr8escape malware use a technique called thread impersonation to breach a network via containers. They don’t target the Kubernetes cluster directly. Instead, they use the cluster to “escape” down to the underlying node and execute malicious code from there. This can disrupt the infrastructure, potentially bringing down the entire hosted Kubernetes cluster from below.
  • Kinsging malware looks for common PostgreSQL server misconfigurations in containers which it uses to deploy additional pods for executing malicious cryptomining code. While this malware doesn’t extract data, it uses the cluster’s resources for free which increases the owner’s costs.
  • Supply chain attacks like SolarWinds and CodeCov infiltrated Kubernetes clusters through external code repositories which bypassed traditional security measures.  

How does malware spread in Kubernetes?

All cyber threats have one thing in common: They want to move. Attackers aim to spread laterally to other resources once they enter the environment, eventually reaching their target.  

Malware spreads by taking advantage of human behavior or open ports, no matter the environment.

DevSecOps challenges with Kubernetes at runtime
All malware wants to move – and they all move the same way.

Unfortunately, people are the weakest link in cybersecurity. Regardless of their training, users may inadvertently click risky links, allowing malware to enter into the network. Once inside, malware scans for open ports to spread to other workloads.  

Malware traditionally uses open RDP, SSH, or SMB ports to deliver payloads to other workloads. Similarly, Kubernetes clusters often have open ports used by NodePort and Kubelet which make it easy for attackers to spread through Kubernetes workloads.  

Protecting Kubernetes: Combine microsegmentation with threat detection

The cybersecurity industry has traditionally taken a detect-and-response approach. Threat-hunting detection tools monitor workloads and applications for unusual behavior. If they find something malicious, security teams then work to eradicate the threat.  

But no matter how fast these detection tools are, today’s threats can spread faster. Even worse, once a breach has been detected, it likely has already spread through the environment. Organizations can’t expect detection tools to be 100% effective.  

We know that breaches spread between workloads over open ports. This means we don’t need to understand the intent of a threat to prevent it from spreading. It's much more effective to monitor and enforce segments first.  

By restricting communication between workloads, you prevent threats from spreading regardless of their intent. And you give your detection tool time to identify the threat.

For example, if someone is trying to break down the door to your house, you don’t first ask them if they’re a criminal and then decide to lock your door or not. You lock the door first and ask questions later.

Segmentation is foundational to any security architecture. Rather than wasting time determining a threat’s purpose, block its pathway immediately. This contains the breach and stops it from spreading further into the network.

Illumio’s approach to containing breaches in Kubernetes

Illumio assumes that a breach will eventually happen in any environment, including Kubernetes. There are several ways that the Illumio platform supports Kubernetes security.

Build proactive microsegmentation

By enforcing microsegmentation across all workloads, Illumio contains breaches at their entry point, preventing them from spreading throughout the network. This means organizations can survive an active breach without impacting their operations.

Automate detection and containment with third-party integrations

Illumio also integrates with third-party detection platforms like to automate the process of detecting and containing threats.  

If zero-day malware is using a port Illumio is allowing, these integrations will share this with the Illumio platform. In response, Illumio will automatically apply security policy to close security gaps and reduce risk before malicious actors can exploit them. 

This means you can implement granular segmentation controls based on real-time threat intelligence, reducing the attack surface and automatically containing breaches. 

Simplify Kubernetes DevSecOps  

Security operations in Kubernetes require security policy to be part of automation workflows used during containerized development cycles.  

With Illumio, you can get Kubernetes visibility and workload enforcement within the same global workflow used across all environments.  

Contain breaches in Kubernetes with Illumio

Attackers want to spread everywhere — even in Kubernetes. And if you can't stop them from spreading, your organization could be tomorrow’s news headline.

Illumio can keep you out of the news by helping you contain breaches, reduce risk, and build resilience. Map traffic and contain breaches across your entire hybrid multi-cloud, inside and outside Kubernetes.  

Contact us today to learn how Illumio can contain breaches in your containers environments.

Related topics

No items found.

Related articles

The Top 3 Reasons We’re Excited for Money 20/20 USA
Zero Trust Segmentation

The Top 3 Reasons We’re Excited for Money 20/20 USA

Meet Illumio in Las Vegas at this year's Money 20/20 USA October 22-25.

Zero Trust Segmentation Is Critical for Cloud Resilience
Zero Trust Segmentation

Zero Trust Segmentation Is Critical for Cloud Resilience

Cloud resilience starts with Zero Trust. Learn the top three cloud issues solved by Zero Trust Segmentation, as shared by ZTS creator John Kindervag.

Forrester: 3 Takeaways on the ROI of Illumio Zero Trust Segmentation
Zero Trust Segmentation

Forrester: 3 Takeaways on the ROI of Illumio Zero Trust Segmentation

Get highlights from Illumio's recent webinar with Forrester experts on the total economic impact of Illumio Zero Trust Segmentation.

How Illumio Builds Cohesive Security for Containers
Zero Trust Segmentation

How Illumio Builds Cohesive Security for Containers

Learn how Illumio enforces security policies and offers complete visibility within all environments – all in one platform.

How to Solve the Top 3 Challenges of Securing Containers and Kubernetes Environments
Zero Trust Segmentation

How to Solve the Top 3 Challenges of Securing Containers and Kubernetes Environments

Learn how to deploy consistent yet flexible security across ever-changing containers and Kubernetes environments.

Kubernetes Isn’t Immune to Ransomware – And How Illumio Can Help
Ransomware Containment

Kubernetes Isn’t Immune to Ransomware – And How Illumio Can Help

Learn why ransomware is a very real cybersecurity risk in Kubernetes that DevSecOps architects can't afford to ignore.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?