1. Centralized Defense: Logging and Mitigation of Kubernetes Misconfigurations with Open Source Tools
- Author
-
Russell, Eoghan and Dev, Kapal
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Software Engineering - Abstract
Kubernetes, an open-source platform for automating the deployment, scaling, and management of containerized applications, is widely used for its efficiency and scalability. However, its complexity and extensive configuration options often lead to security vulnerabilities if not managed properly. This paper presents a detailed analysis of misconfigurations in Kubernetes environments and their significant impact on system reliability and security. A centralized logging solution was developed to detect such misconfigurations, detailing the integration process with a Kubernetes cluster and the implementation of role-based access control. Utilizing a combination of open-source tools, the solution systematically identifies misconfigurations and aggregates diagnostic data into a central repository. The effectiveness of the solution was evaluated using specific metrics, such as the total cycle time for running the central logging solution against the individual open source tools., Comment: Keywords: Central Logging Solution, Cloud Native Computing Foundation, Amazon Web Services, Application Programming Interface, Command Line Interface, Internet Protocol, Media Access Control, Domain Name System, Common Vulnerabilities Exposures, Information Technology, Role-Based Access Control
- Published
- 2024