New England College, USA.
World Journal of Advanced Research and Reviews, 2025, 26(02), 2352-2362
Article DOI: 10.30574/wjarr.2025.26.2.1741
Received on 29 March 2025; revised on 06 May 2025; accepted on 09 May 2025
This article examines the security challenges associated with containerized applications in Kubernetes environments. It explores the evolution from traditional security models to container-specific approaches needed for ephemeral, distributed workloads. The methodology evaluates security solutions across vulnerability management, compliance monitoring, runtime protection, network security, and access control dimensions. The discussion highlights key challenges including container image vulnerabilities, runtime security enforcement in dynamic environments, multi-tenancy concerns, network segmentation complexities, tooling limitations at scale, and compliance issues in regulated industries. Results demonstrate the effectiveness of comprehensive security controls spanning the container lifecycle, from image scanning and registry controls to runtime protection, network policies, role-based access control, and compliance automation. The article concludes by examining future directions, including zero-trust security models, AI-powered anomaly detection, DevSecOps integration, emerging supply chain security standards, serverless security evolution, and research opportunities in container isolation technologies.
Container security; Kubernetes orchestration; DevSecOps integration; Zero-trust architecture; Runtime protection
Preview Article PDF
Srikanth Potla. The evolution of container security in Kubernetes environments. World Journal of Advanced Research and Reviews, 2025, 26(2), 2352-2362. Article DOI: https://doi.org/10.30574/wjarr.2025.26.2.1741