Completion Date
Fall 12-14-2022
Document Type
Thesis
Degree Name
Master of Science (MS)
Program or Discipline Name
Computer and Information Sciences
First Advisor
Mike Shahine
Second Advisor
Mani Akella
Abstract
In the last few years, it is apparent to cybersecurity experts everywhere that the proverbial container tech genie is out of the bottle, and has been widely embraced across multiple organizations. To achieve the flexibility of building and deploying applications anywhere and everywhere, cloud native environments have gained great momentum and made the development lifecycle simpler than ever. However, container environments brings with them a range of cybersecurity issues that includes images, containers, hosts, runtimes, registries, and orchestration platforms, which needs the necessity to focus on investing in securing your container stack.
According to this report[1], released by cloud-native security provider Aqua Security on June 21’, there are multiple ways attackers can breach a company's container infrastructure and the image supply chain. They also estimated a rise of 600% in the second half of 2020 as compared to the previous year. These attacks generally involves passive scanning methods to access servers that run Docker and Kubernetes platform. Per another report[2], the focus should not only be around securing the tools that are cloud provided, but should also include securing the distributed components involved in the software supply chain throughout the development and deployment process.
This study will lay down a set of rules that can be followed to secure the DevOps workflows for Kubernetes applications, and will cover the most critical security and reliability requirements without causing any delay in the releases and ensure operational independence. This would further detect and prevent attackers who attempt to use Kubernetes to breach the systems, by picking on the vulnerabilities.
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Recommended Citation
Sadhwani, V. (2022). Cloud Container Security’ Next Move. Retrieved from https://digitalcommons.harrisburgu.edu/csms_dandt/3