StackRox has done it again. We’ve been recognized once more for our leadership role in the industry – this time as a finalist in the Black Unicorn Awards for 2019 at Black Hat, on now in Las Vegas. This award recognizes those cyber security innovators that judges deem have the potential to reach a $1 billion market potential. Cyber Defense Magazine chose just 30 finalists amongst all entries. Cyber security industry veterans Gary Miliefsky of Cyber Defense Magazine, Robert Herjavec of Herjavec Group, and David DeWalt of NightDragon served as the judges for this year’s Black Unicorn awards.
A new Kubernetes security vulnerability was announced today, along with patch releases for the issue for Kubernetes versions 1.13, 1.14, and 1.15. CVE-2019-11247 discloses a serious vulnerability in the K8s API that could allow users to read, modify or delete cluster-wide custom resources, even if they only have RBAC permissions for namespaced resources. If your clusters aren’t using Custom Resource Definitions (CRDs), you aren’t affected. But CRDs have become a critical component of many Kubernetes-native projects like Istio, so many users are impacted.
In our previous blog post about the Istio service mesh, we provided an overview of Istio’s features and capabilities and why you may (and sometimes may not, at least not yet) want to use it as a service mesh in your Kubernetes clusters. In this post, we’ll dive a little deeper into how Istio can help improve the runtime security of the applications in a service mesh and where it fits in the broader picture of Kubernetes security controls and practices.
The awards just keep rolling in … We are thrilled to announce that StackRox has been chosen as a Gold Winner at the 14th Annual Network Products Guide’s 2019 IT World Awards in the Security Services category. StackRox was recognized for our container-native and Kubernetes-native security solution to help our customers protect containers and Kubernetes environments throughout the container life cycle. Containers and Kubernetes have drastically accelerated and streamlined cloud-native application development and deployment, with organizations across industries containerizingtheir most critical production workloads at an ever increasing pace.
We recently repeated our survey of IT and security practitioners to understand the state of security in your container and Kubernetes environments. In our inaugural survey last year, the key findings included: Lack of adequate security strategy topped the list of container strategy concerns Runtime was the lifecycle phase that was of most concern from a security perspective Kubernetes was used by just over half (57%) of respondents for container orchestration This time around we expanded the audience from 230 to more than 390 IT and security practitioners.
Right on the heels of winning two CODiE awards, StackRox was just named a Computer Reseller News 2019 Emerging Vendor. StackRox and our Kubernetes-native container security platform were chosen for our ability to help organizations harden and secure Kubernetes environments at scale. DevOps practices and the cloud-native stack provide the channel with rich opportunities to help companies enable business transformation. The underlying technologies of containers and Kubernetes, however, wreak havoc with traditional security tooling and processes.
Kubernetes is by far the most widely used container orchestrator in the market, and Kubernetes adoption – especially in production environments – is taking off. According to Gartner, “by 2022, more than 75% of global organizations will be running containerized applications in production.” The explosion in Kubernetes adoption hasn’t been without its share of security concerns. Earlier this year, the runC vulnerability, which allows an attacker to gain host-level code execution by breaking out of a running container, was discovered.
StackRox has long-standing roots in helping to secure the cloud-native stacks at a variety of Federal Government agencies. Over the past two years, we’ve earned contracts with the Department of Homeland Security (DHS) Science and Technology Directorate (S&T)”) and have secured an investment and technology development agreement with In-Q-Tel. Today we’re excited to share the latest milestone in our work with U.S. Government agencies – the StackRox Kubernetes Security Platform has been added to the DHS Continuous Diagnostics and Mitigation (CDM) Approved Products List (APL).
This is the third article of a three-part blog series reviewing Gartner Security & Risk Management Summit 2019. Don’t forget to read article one titled Gartner’s Top 10 Security Projects for 2019 - Container Security Makes the List, and article two titled Gartner on Securing Cloud-Native Apps. We’ve been sharing the highlights of Gartner’s recent Security conference – the inclusion of container security in Gartner’s list of Top 10 Security Projects for 2019 and Best Practices for Securing Cloud-native Apps.
This is the second article of a three-part blog series reviewing Gartner Security & Risk Management Summit 2019. Don’t forget to read article one titled Gartner’s Top 10 Security Projects for 2019 - Container Security Makes the List, and article three titled Gartner: How-To Guide on Securing Containers. Properly implemented, cloud-native apps will be the most secure applications your organization has ever developed or deployed. So began analyst Neil MacDonald in his talk on “Security Patterns and Best Practices for Securing Cloud-native Applications” at the recent Gartner security summit.
Container usage for production deployments in enterprises is still constrained by concerns regarding security, monitoring, data management and networking. So begins the Gartner report, listing those concerns as the number one key challenge limiting container adoption. The cost of bolting on security later in the container lifecycle is steep, and making substantial changes to your infrastructure to move from dev/test into prod means you won’t realize one of the key advantages of containerization - namely, speed.