Operant AI announced the launch of MCP Gateway, an expansion of its flagship AI Gatekeeper™ platform, that delivers comprehensive security for Model Context Protocol (MCP) applications.
Kubernetes has become increasingly ubiquitous as organizations across the globe pivot to embrace a more container-based model for application development and code deployment. Today, 85% of organizations say they use Kubernetes, with nearly a third of those indicating they fully transitioned their applications to the system.
For developers and engineers, Kubernetes represents a significant — and welcome — shift. Rather than building larger and larger applications, Kubernetes allows them to scale horizontally, adding more versions of the application where necessary and simplifying the process of code distribution and deployment. This leaves developers free to focus on mission-critical tasks, rather than constantly fretting over administrative concerns like managing upkeep, adding additional servers, or monitoring for outages.
Unfortunately, Kubernetes also comes with drawbacks — mainly in the form of security vulnerabilities that most businesses have yet to fully wrap their minds around. The benefits of Kubernetes have led to something of a gold rush, but soaring Kubernetes adoption rates have eclipsed the ability of more organizations to secure their containers effectively. Using Kubernetes as a foothold, attackers are often able to spread across different systems and devices — and security analysts don't always have the tools they need to detect these incursions, let alone stop them. As the shift toward Kubernetes continues, organizations need to understand how to effectively protect their environments — or risk becoming the next major victim of a breach.
How Attackers Can Exploit Kubernetes Environments
One of the biggest problems when it comes to securing Kubernetes environments is the simple lack of expertise. Because Kubernetes is still (relatively) new, there are only so many security operators who understand the ins and outs of protecting the system — and those who do are in high demand.
Well-resourced organizations with strong in-house security resources may be able to attract and retain those experts, but this won't be an option for everyone. Small and mid-sized businesses (SMBs) in particular may not have the necessary resources to build and maintain that level of in-house expertise, forcing them to look to outside experts and partners to supplement their knowledge and capabilities.
There are multiple ways adversaries can attack Kubernetes environments, and they often involve exploiting this knowledge gap. Accidental misconfigurations are common, and a simple mistake like granting unnecessary permissions to an account or user can create an easy opening for attackers. Third-party attacks have also become increasingly common across all elements of security, and Kubernetes could be used to proliferate a compromised element throughout the organization. There are also attackers who target Kubernetes directly, manipulating applications to run malicious commands that grant them access to secure environments. Currently, our observation of these attacks is limited to more sophisticated threat actors (or skilled red teamers), but this is likely to change as attackers become increasingly familiar with the Kubernetes landscape.
As with any cyberattack, attacks targeting Kubernetes can be devastating to an organization. While there are damaging activities an attacker might perform within Kubernetes environments themselves, gaining access via Kubernetes often serves as a stepping-stone to the broader network. The danger isn't always what attackers can do with Kubernetes — it's where they might go from there.
Initial Steps to Lock Down Kubernetes Environments
The first — and arguably most important — step an organization can take is to make use of existing security guidelines and information sharing opportunities. Security teams across the globe are strapped for resources, but helpful security guidelines and threat intelligence data are surprisingly easy to come by.
Established advisory bodies like MITRE publish free security frameworks, and there are tools that can help organizations map those recommendations directly onto their Kubernetes environments. That makes it much easier for businesses to understand the potential attack paths adversaries might take when accessing their cloud environments, helping security teams not only track attackers but also anticipate the movements they are most likely to make and the tactics they are most likely to use. It's also a good idea to make sure developers and security teams have a close working relationship so that security professionals understand what "normal" looks like. This can help them avoid falsely flagging "suspicious" behavior that is actually just benign developer activity.
A lot of ink has been spilled on the idea of "shifting left," and for good reason: embracing a "shift left" mentality is a critical way to ensure that necessary security measures are introduced earlier in the application development lifecycle. Rather than attempting to shoehorn security measures into an application after the fact, organizations should be seeking to identify potential vulnerabilities during the development process and implementing appropriate mitigation measures as a matter of course. Identifying vulnerabilities early helps reduce the burden on developers — not to mention reducing the potential for costly mistakes.
Finally, preventing malicious initial access is one of the most important and effective ways to protect Kubernetes environments. This requires organizations to stitch together the authentication logs from its cloud identity and access management (IAM) service or other authentication provider along with the API activity logs from the Kubernetes system. Authentication flows happen outside the Kubernetes cluster and won't be logged there — but once authenticated, security teams should be able to identify authorization decisions and follow up on activities recorded in the Kubernetes audit logs. If suspicious activity or unauthorized access attempts are detected in one or both of these areas, security teams should have a good idea where to look for attackers and where additional protections may be needed in the future.
Taking the First Steps Toward Kubernetes Security
The emergence of Kubernetes as a developer-friendly system for application development has been a significant boon for many businesses, but failure to implement appropriate security capabilities has rendered these environments — and the organizations that use them — vulnerable to attack. While Kubernetes expertise is not always easy to come by for businesses, there are simple and immediate steps that most can take to begin protecting their Kubernetes environments more effectively. By making use of publicly available resources, embracing a shift-left mentality, and implementing stronger authentication capabilities, today's organizations can avoid making their Kubernetes environments an easy target for attackers.
Industry News
Oracle has expanded its collaboration with NVIDIA to help customers streamline the development and deployment of production-ready AI, develop and run next-generation reasoning models and AI agents, and access the computing resources needed to further accelerate AI innovation.
Datadog launched its Internal Developer Portal (IDP) built on live observability data.
Azul and Chainguard announced a strategic partnership that will unite Azul’s commercial support and curated OpenJDK distributions with Chainguard’s Linux distro, software factory and container images.
SmartBear launched Reflect Mobile featuring HaloAI, expanding its no-code, GenAI-powered test automation platform to include native mobile apps.
ArmorCode announced the launch of AI Code Insights.
Codiac announced the release of Codiac 2.5, a major update to its unified automation platform for container orchestration and Kubernetes management.
Harness Internal Developer Portal (IDP) is releasing major upgrades and new features built to address challenges developers face daily, ultimately giving them more time back for innovation.
Azul announced an enhancement to Azul Intelligence Cloud, a breakthrough capability in Azul Vulnerability Detection that brings precision to detection of Java application security vulnerabilities.
ZEST Security announced its strategic integration with Upwind, giving DevOps and Security teams real-time, runtime powered cloud visibility combined with intelligent, Agentic AI-driven remediation.
Google announced an upgraded preview of Gemini 2.5 Pro, its most intelligent model yet.
iTmethods and Coder have partnered to bring enterprises a new way to deploy secure, high-performance and AI-ready Cloud Development Environments (CDEs).
Gearset announced the expansion of its new Observability functionality to include Flow and Apex error monitoring.
Check Point® Software Technologies Ltd. announced that U.S. News & World Report has named the company among its 2025-2026 list of Best Companies to Work For.
Postman announced new capabilities that make it dramatically easier to design, test, deploy, and monitor AI agents and the APIs they rely on.