Portshift Introduces K8SHIELD Framework and Context Aware Security
July 15, 2020

Portshift announced the company's new K8SHIELD Framework and the introduction of context aware security policy enablement.

These enhancements support DevOps and security professionals with environmental clarity and protection against the known tactics and techniques used by cyber-criminals targeting Kubernetes as described in the MITRE ATT&CK Framework .

The K8SHIELD Framework is a Portshift-developed knowledge base of curated information that provides a clear picture of adversarial tactics, techniques, and common knowledge to organize and categorize various processes and approaches used by threat actors in the digital world. The framework, modeled after the well-known MITRE ATT&CK Framework, but designed specifically for the Kubernetes ecosystem, allows for the identification of attack patterns within Kubernetes clusters, following the attack methods defined by the MITRE ATT&CK Framework. K8SHIELD then analyzes those patterns to provide remediation suggestions and detailed reports.

A greater view of K8's containerized environment attack surfaces is a critical first step in strengthening security for Kubernetes deployments. The K8SHIELD Framework provides a window to better understand the current security vulnerabilities of the Kubernetes implementation. With this framework, DevOps and security professionals now have access to a globally-accessible knowledge base for threat modeling for more resilient container operating environments and overall security context required for an efficient security posture.

In addition to K8SHIELD integration, Portshift is introducing a new risk analysis tool that can predict the threat potential of Kubernetes objects based on a variety of parameters, allowing DevSecOps teams to prioritize their tasks based on the actual risk level. K8SHIELD provides information on security misconfigurations and overly permissive permissions to resources as well as on their exposure to malicious access. The new feature detects cloud credentials, security tokens and other actions that allow access ­ a unique and more proactive capability that furthers the shift of security to the left.

New enhancements included in this Portshift Kubernetes-native protection update include:

- K8SHIELD Framework based on the known MITRE ATT&CK Framework, providing security teams with detailed analysis of their Kubernetes clusters' risk level.

- K8SHIELD's holistic view of the Kubernetes cluster risk level with dedicated mitigation suggestions for each attack pattern.

- Synergy with the MITRE ATT&CK Framework - execution, defense evasion, credential access, discovery and lateral movement sections.

- Ability to minimize crypto-mining manipulations through tight control of deployed pods and CronJobs.

- Detection of exposed Kubernetes dashboards or applicative dashboards deployed in Kubernetes clusters.

"With the deployment of Kubernetes into a growing number of enterprise IT systems and web applications, it is incumbent among organizations to adopt the most advanced container security available," said Zohar Kaufman, VP, R&D for Portshift. "With the addition of this extensive new feature set, DevOps and IT security professionals can be assured that Portshift's single pane of glass cloud-native platform delivers on the promise of best-of-breed protection for these mission critical environments."

Share this

Industry News

November 24, 2020

Red Hat announced new capabilities and features for Red Hat OpenShift, the company's enterprise Kubernetes platform.

November 24, 2020

Sectigo released Chef, Jenkins, JetStack Cert-Manager, Puppet, and SaltStack integrations for its certificate management platform.

November 24, 2020

DataStax released K8ssandra, an open-source distribution of Apache Cassandra on Kubernetes.

November 23, 2020

Spectro Cloud has released a new, self-hosted version of its flagship product, Spectro Cloud.

November 23, 2020

GitLab completed integration of Peach Tech, a security software firm specializing in protocol fuzz testing and dynamic application security testing (DAST) API testing, and Fuzzit, a continuous fuzz testing solution providing coverage-guided testing.

November 23, 2020

Fugue announced the availability of its SaaS product in AWS Marketplace, further simplifying the process for Amazon Web Services customers to use Fugue to bring their environments into compliance quickly, demonstrate compliance at any time, and Shift Left on cloud security.

November 19, 2020

Rollbar announced AI-assisted workflows powered by its new automation-grade grouping engine.

November 19, 2020

Buildkite expanded its integration with GitHub and introduced a new onboarding experience.

November 19, 2020

Rancher Labs launched a new Partner Program for the OEM and embedded community.

November 18, 2020

Puppet announced its evolution to an integrated automation platform to enable key business initiatives such as scaling DevOps, risk reduction, policy as code, and evolving cloud strategies.

November 18, 2020

Adaptavist has joined the GitLab partner program as a Select partner.

November 18, 2020

Postman launched the beta version of public workspaces, a hub that makes it possible for both API producers and consumers to seamlessly communicate and collaborate in real time without team or organizational boundaries.

November 17, 2020

Red Hat introduced new capabilities for Red Hat Enterprise Linux and Red Hat OpenShift intended to help enterprises bring edge computing into hybrid cloud deployments.

November 17, 2020

Humio announced the availability of the Humio Operator.

November 17, 2020

Accurics announced that Terrascan, the open source static code analyzer that enables developers to build secure infrastructure as code (IaC), has been extended to support Helm and Kustomize.