Cloud-Native Security Threats And Pitfalls: What’s Your Last Line Of Defense?
It’s time to rethink legacy backup and recovery systems when you go cloud-native, and portability is key.
Cloud – Kubernetes is innovative, but it’s not bulletproof. On June 2, a team of plugin developers working with the Jenkins Artifactory system discovered an error in a Kubernetes deployment they were using. It was serious enough to knock out their platform, forcing them to rebuild parts of it from scratch while losing three months of work on a database containing details about users and their accounts.
Later, when they re-registered their old online account, they found it had automatically enabled all the access and permissions from the old, deleted account. That meant someone could have slipped in, registered an account under the same name and used it to push malware onto unsuspecting users under the guise of the victimized company.
That’s more than just a theoretical scenario; attackers are constantly on the lookout for Kubernetes-orchestrated containers with misconfigured ports — which, in some cases, have seen more than 100 scans targeting each IP address every day. A search by the port-scanning service Shodan, for example, found some 6,000 IP addresses with vulnerable installations of Docker, exposing them to a cryptomining malware script that turns off security while blocking competing cryptomining attackers.
In the six years that it’s been around, Kubernetes has emerged as the high-performance platform of choice for all types of cloud-native applications, and for many reasons. However, while Kubernetes offers a level of resilience, the data that users frequently store in a Kubernetes environment is not secure without added controls. Protecting data, which is increasingly the crown jewel of current business enterprises, remains the responsibility of the developers, IT and security teams that have come to rely on Kubernetes.
There are multiple versions and flavors of Kubernetes — which issues new releases as often as three or four times a year — and a growing number of vendors who support the Kubernetes ecosystem. This freedom of choice is one of the things that makes Kubernetes so powerful. Unfortunately, this can also introduce risk if you have a novice at the helm of your deployment or too many supporting solutions that introduce risk via misconfiguration. Kubernetes Backup and Mobility is a critical service that serves as the last line of defense to recover from security attacks and accidental misconfigurations.
Backing up essential cloud-native applications — including the associated data, particularly when they are held across a matrix of resources owned by different vendors — can be challenging. Some backup systems force the customer to choose between the various suppliers and environmental options and then lock them into that choice. However, for reasons of security, cost or, in some cases, regulatory compliance, there is a requirement to migrate applications between environments over time. For a backup and disaster recovery system to be useful, it needs to seamlessly span those Kubernetes environments and locations, following the customer’s applications and data wherever it takes them, but without losing sight of the protection policies.
As a result, application portability and mobility are an essential requirement for a growing number of IT deployments and projects. Beyond that, as each new microservice is built into an application, it tends to favor its own database because of its distinctive strengths. That’s a lot of moving parts. Once you add together the different venues for development, processing, database, storage and security, you begin to see the complex grid of resources routinely involved in most digital innovation today.
Fortunately, backup and disaster recovery solutions that are purpose-built for Kubernetes and provide an application-centric approach to data protection and management exist. Serving as a last line of defense, such a solution can overcome the complexity of working in a growing cloud-native ecosystem.
When researching a potential solution, some key attributes to look for include:
• An ability for automatic application discovery.
• Integrations with relational and NoSQL databases.
• Kubernetes distributions across on-premises.
• Clouds to provide enterprises the freedom of infrastructure choice without sacrificing operational simplicity.
In summary, make sure that the operations/IT team has deployed a last line of defense that is dependable for protecting and recovering from issues affecting cloud-native applications. Ensure that the backup solutions deployed are Kubernetes-native, can work with modern databases and allow you the freedom of choice to work across on-premises and public clouds.
This article originally appeared on forbes.com To read the full article and see the images, click here.
Nastel Technologies uses machine learning to detect anomalies, behavior and sentiment, accelerate decisions, satisfy customers, innovate continuously. To answer business-centric questions and provide actionable guidance for decision-makers, Nastel’s AutoPilot® for Analytics fuses:
- zAdvanced predictive anomaly detection, Bayesian Classification and other machine learning algorithms
- Raw information handling and analytics speed
- End-to-end business transaction tracking that spans technologies, tiers, and organizations
- Intuitive, easy-to-use data visualizations and dashboards
Nastel Technologies is the global leader in Integration Infrastructure Management (i2M). It helps companies achieve flawless delivery of digital services powered by integration infrastructure by delivering tools for Middleware Management, Monitoring, Tracking, and Analytics to detect anomalies, accelerate decisions, and enable customers to constantly innovate, to answer business-centric questions, and provide actionable guidance for decision-makers. It is particularly focused on IBM MQ, Apache Kafka, Solace, TIBCO EMS, ACE/IIB and also supports RabbitMQ, ActiveMQ, Blockchain, IOT, DataPower, MFT, IBM Cloud Pak for Integration and many more.
The Nastel i2M Platform provides:
- Secure self-service configuration management with auditing for governance & compliance
- Message management for Application Development, Test, & Support
- Real-time performance monitoring, alerting, and remediation
- Business transaction tracking and IT message tracing
- AIOps and APM
- Automation for CI/CD DevOps
- Analytics for root cause analysis & Management Information (MI)
- Integration with ITSM/SIEM solutions including ServiceNow, Splunk, & AppDynamics