Recently, the use of container technology for applications has become commonplace. The advantages of this technology allow you to quickly develop and implement new services and applications in any programming language. The Kubernetes platform is the most popular container orchestration tool and is widely used for application development and deployment. Kubernetes not only allows you to deploy applications, but also performs functions such as load balancing, storage organization, secret storage and much more. However, experts pay attention to possible security problems when using Kubernetes. Attackers can use application containers in Kubernetes not only to obtain data processed by the application, but also to form an entry point into the company's infrastructure for a subsequent attack on the company's internal assets. The configuration requirements of the containerization platform cannot fully protect against malicious actions from containers, so it is necessary to supplement the protection system with tools that could track actions in the container in real time. This article will compare several Kubernetes real-time cluster security solutions and show their advantages and disadvantages.
Original languageEnglish
Title of host publicationProceedings - 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology, USBEREIT 2023
Subtitle of host publicationbook
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages283-285
Number of pages3
ISBN (Electronic)979-835033605-4
DOIs
Publication statusPublished - 15 May 2023
Event2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT) - ИРИТ-РТФ УрФУ, Екатеринбург, Russian Federation
Duration: 15 May 202317 May 2023

Conference

Conference2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT)
Country/TerritoryRussian Federation
CityЕкатеринбург
Period15/05/202317/05/2023

ID: 41994955