Navigating the Landscape of Kubernetes Security Threats and Challenges

Authors

  • Sandeep Kampa Independent Researcher Author

DOI:

https://doi.org/10.60087/jklst.v3.n4.p274

Abstract

The rise of containerization and the widespread adoption of Kubernetes have revolutionized the way applications are deployed and managed. This paradigm shift has introduced new security risks and challenges that must be addressed. This paper delves into the various security threats and vulnerabilities associated with Kubernetes, exploring mitigation strategies and best practices to enhance the overall security posture of containerized environments. Kubernetes, as a leading container orchestration platform, has become the de facto standard for managing and scaling containerized applications in modern IT infrastructure. While Kubernetes offers numerous benefits, such as improved scalability, portability, and resource optimization, it also introduces a unique set of security concerns that must be carefully navigated. This paper aims to provide a comprehensive overview of the security threats and challenges faced in Kubernetes environments, as well as the current approaches and tools used to address these critical issues.

Downloads

Download data is not yet available.

References

Yasrab, R. (2018). Mitigating Docker security issues. arXiv preprint arXiv:1804.05039. https://doi.org/10.48550/arXiv.1804.05039

Subramanian, N., & Jeyaraj, A. (2018). Recent security chal-lenges in cloud computing. Computers & Electrical Engi-neering, 71, 28–42. https://doi.org/10.1016/j.compeleceng.2018.06.006

UK public ready for E-government. (n.d.). Retrieved from [original source not provided in available results; additional search required for full source details]

Vayghan, L. A., Saied, M. A., Toeroe, M., & Khendek, F. (2021). A Kubernetes controller for managing the availability of elastic microservice-based stateful applications. Journal of Systems and Software, 175, 110924. https://doi.org/10.1016/j.jss.2020.110924

Wong, A. Y., Chekole, E. G., Ochoa, M., & Zhou, J. (2024). Threat modeling and security analysis of containers: A survey. [Journal/Conference Name], Volume(Issue), pages. [DOI or URL if available; details incomplete based on search results]

Mullinix, S. P., Konomi, E., Townsend, R. D., & Parizi, R. M. (2020). On security measures for containerized applications imaged with Docker.

Downloads

Published

27-10-2024

How to Cite

Kampa, S. (2024). Navigating the Landscape of Kubernetes Security Threats and Challenges. Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online), 3(4), 274-281. https://doi.org/10.60087/jklst.v3.n4.p274

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 10 > >>