Container security in the cloud: Hardening orchestration platforms against emerging threats

Sina Ahmadi *

The University of Melbourne.
 
Research Article
World Journal of Advanced Research and Reviews, 2019, 04(01), 064-074
Article DOI: 10.30574/wjarr.2019.4.1.0077
 
Publication history: 
Received on 22 October 2019; revised on 17 November 2019; accepted on 20 November 2019
 

 

Abstract: 
Container proliferation and platform orchestration tools like Kubernetes have accelerated the deployment and scalability of applications in the cloud. However, these advances come at a cost, and the old and new environments are vulnerable to lateral movement attacks, misconfiguration, unpatched container images, and inadequate access control. This paper explores comprehensive strategies to enhance container security, focusing on key areas: Network security policies, runtime security, access management, supply chain security, and orchestration platform security. The proposed framework emphasizes network segmentation, real-time anomaly detection, robust role-based access control (RBAC), automated vulnerability assessments, and optimized network configurations. In a pilot implementation, the framework reduced security incidents by 35%, improved compliance by 25%, and boosted overall operational efficiency by 20%. The success rates, proven in this study, confirm the possibility of a balanced security model for defending successful workloads in cloud orchestration platforms against external attempts of unauthorized access and data manipulation. This work emphasizes the necessity for new approaches to protecting highly dynamic containerized environments as we know them today.
 
Keywords: 
Container Security; Cloud Computing; Kubernetes; Orchestration Platforms; Cybersecurity; RBAC; Network Policies; Supply Chain Security
 
Full text article in PDF: 
Share this