September 25, 2021

Malware Protection

Dedicated Forum to help removing adware, malware, spyware, ransomware, trojans, viruses and more!

How to secure your Kubernetes systems from hackers? A detailed tutorial from NSA experts

How to secure your Kubernetes systems from hackers? A detailed tutorial from NSA experts

A recent report from the Cybersecurity and Infrastructure Security Agency (CISA) points to the detection of multiple errors that allow the deployment of denial of service (DoS) attacks, theft of sensitive information and cryptojacking in deployments of Kubernetes, the open source container system for deploying applications in the cloud.

These systems are compromised by supply chain attacks, deployed by threat actors and even by internal malicious users. The notice was issued by CISA and investigators from the National Security Agency (NSA).

How to secure your Kubernetes systems from hackers? A detailed tutorial from NSA experts

In the alert, the agencies point out some of the security risks associated with Kubernetes deployments, as well as share some tips for administrators and developers to create a better security environment. 

This set of measures applies to both public agencies and private organizations, says a statement from the Department of Defense, the Defense Industrial Base and Homeland Security Systems.

Recommended security measures include constant scanning of containers for any exploitable security flaws, restricting privileges to users, isolating specific networks, installing firewall solutions, and implementing authentication mechanisms reliable enough to mitigate the most common attacks.

In addition, CISA and NSA recommend that administrators follow the guidance provided and keep their systems updated to the latest versions available. The full report on these Kubernetes flaws is available on the official CISA website.

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.

The post How to secure your Kubernetes systems from hackers? A detailed tutorial from NSA experts appeared first on Cyber Security News | Exploit One | Hacking News.