preloader
  • Home
  • Sysdig Kubernetes Security

Security and monitoring solution for Kubernetes

blog-thumb

Security and monitoring solution for Kubernetes.

Sysdig enterprise aims to analyze the security of Kubernetes clusters and all their integrations, such as registries and CI/CD belts. This solution can also prevent abuse through the use of policies, as well as indicating what can be improved in your cluster in order to increase the overall reliability levels of the environment.

The solution is based on interactive dashboards, of which the platform already has a wide range. It is also possible to create customized dashboards.

This kind of solution is especially important for financial institutions, such as banks, insurance companies and investment firms.

Some niche markets have strict security standards.

This article will be divided into 3 parts. In this first part we’ll talk a bit about Sysdig, and in the other two I’ll show you how to install and configure sysdig agents on OpenShift clusters, which is Red Hat’s Kubernetes platform solution. The procedure is the same for different Kubernetes clusters, so the information will probably be useful to you.


Sysdig Monitor

Sysdig Monitor is a solution that automatically assesses the health of Kubernetes environments. In reality, it also works with Linux servers, but in this article we’ll only be talking about Kubernetes.


Let’s explore some of the dashboards provided.


Dashboards
General clusters health

Workload status and performance information

Individual details about the platform’s nodes (servers):

Events for each node with indicators sorted by criticality

Details of events of interest according to namespace can be consulted:

Events by namespace

Events:

Events relating to PODs in execution, with the creation of individual alerts

The agent itself is monitored:

The data collected from the agents is also checked for reliability.

Resource consumption:

Detailed resource consumption can help to understand whether an application is consuming too much, as well as to plan hardware upgrades and cloud instances.

Capacity Planning:

Useful dashboard to help predict when it will be necessary to increase the capacity of computing resources.


Sysdig Secure

Sysdig Secure operates on several layers and is dedicated to analyzing and mitigating security events relating to applications and infrastructure of the Kubernetes platform. There are policies that can be enabled in real time in order to mitigate possible security impacts on the environment. These policies can help prevent data leaks and other types of abuse.

Security and compliance posture.

Real-time policies:

There are policies available for various flavors of kubernetes, which can be enabled with just one click.

Insight into the vulnerabilities of the environment:

Consolidated dashboard with all the vulnerabilities found in the kubernetes cluster, classifying them by criticality.

General insights:

Activities within the kubernetes cluster, classified by group and type.

Detailed insights into the PODs under execution, classified by level.


Registry integration

Normally kubernetes clusters are integrated with a registry solution. In this example, the registry solution in use is Quay.

Through integration, it is possible to analyze the stored images and search for those that are vulnerable and need to be adapted.

Vulnerabilities of the images stored in the registry.

Overall security compliance is classified by severity level. This helps prioritize the activities that should be carried out to increase the level of security in the environment.

Security compliance posture, detailing criticality levels.

Real-time policies can be activated to proactively mitigate vulnerabilities and insecure configurations.

Security compliance posture, detailing criticality levels.

Ready to use policies act on the application layer and even on the base operating system of the nodes in the Kubernetes cluster.


Finalizing

There are countless other dashboards, configurations, integrations, policies and so on to explore!

In this article we’ve seen how interesting the Sysdig solution is, and how it can help combat security problems.

In the next articles, we’ll get to grips with how to install, configure and integrate Sysdig agents in a Kubernetes cluster.


Did you like the content? Check out these other interesting articles! 🔥



Could you help?

Please support this content by clicking on one of our advertisers’ banners. ❤️

comments powered by Disqus