securing kubernetes workloads on aws · 2020-04-22 · securing kubernetes workloads on aws as...

2
VISIBILITY See your entire landscape of images, registries, containers, deployments, and runtime behavior. VULNERABILITY MANAGEMENT Go beyond vuln scores to enforce configuration best practices at build, deploy, and runtime. COMPLIANCE Demonstrate compliance with standard-specific controls for CIS Benchmarks, NIST, PCI, and HIPAA and frameworks such as SOC 2. NETWORK SEGMENTATION Leverage the native controls in Kubernetes to isolate assets, block deployments, or kill pods. RISK PROFILING See a stack-ranked list of all deployments with risk factors to identify highest priority fixes first. CONFIGURATION MANAGEMENT Apply best practices for Docker and Kubernetes to build your systems securely from the start. THREAT DETECTION Use rules, whitelists, and baselining to accurately identify suspicious activity in your systems. INCIDENT RESPONSE Take action, from alerting to killing pods to thwart attacks, using infrastructure for enforcement. Securing Kubernetes Workloads on AWS As companies increasingly adopt DevOps practices and the cloud-native stack, they must at the same time secure this new infrastructure. To secure containers and Kubernetes workloads on AWS effectively demands new tooling and new processes. The StackRox Kubernetes Security Platform enables AWS customers to visualize their Kubernetes environments, provides risk profiling across infrastructure, reduces the attack surface, and finds and stops malicious activity. The StackRox platform integrates into the infrastructure DevOps teams depend on, including CI/CD tools, Amazon Elastic Container Service for Kubernetes (EKS) or Kubernetes running on Elastic Compute Cloud (EC2), and Amazon Elastic Container Registry (ECR), and leverages DevOps workflows to make container and Kubernetes security scalable, practical, and operational. Security Across the Full Container Life Cycle Detect malicious activity in real time Alert on or block attacks Secure the images Assess the risk profile of assets Harden the environment Reduce the attack surface

Upload: others

Post on 20-May-2020

11 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Securing Kubernetes Workloads on AWS · 2020-04-22 · Securing Kubernetes Workloads on AWS As companies increasingly adopt DevOps practices and the cloud-native stack, they must

VISIBILITYSee your entire landscape of images, registries, containers, deployments, and runtime behavior.

VULNERABILITY MANAGEMENTGo beyond vuln scores to enforce con�guration best practices at build, deploy, and runtime.

COMPLIANCEDemonstrate compliance with standard-speci�c controls for CIS Benchmarks, NIST, PCI, and HIPAA and frameworks such as SOC 2.

NETWORK SEGMENTATIONLeverage the native controls in Kubernetes to isolate assets, block deployments, or kill pods.

RISK PROFILINGSee a stack-ranked list of all deployments with risk factors to identify highest priority �xes �rst.

CONFIGURATION MANAGEMENTApply best practices for Docker and Kubernetes to build your systems securely from the start.

THREAT DETECTIONUse rules, whitelists, and baselining to accurately identify suspicious activity in your systems.

INCIDENT RESPONSETake action, from alerting to killing pods to thwart attacks, using infrastructure for enforcement.

Securing Kubernetes Workloads on AWSAs companies increasingly adopt DevOps practices and the cloud-native stack, they must at the same time secure this new infrastructure. To secure containers and Kubernetes workloads on AWS effectively demands new tooling and new processes. The StackRox Kubernetes Security Platform enables AWS customers to visualize their Kubernetes environments, provides risk profiling across infrastructure, reduces the attack surface, and finds and stops malicious activity.

The StackRox platform integrates into the infrastructure DevOps teams depend on, including CI/CD tools, Amazon Elastic Container Service for Kubernetes (EKS) or Kubernetes running on Elastic Compute Cloud (EC2), and Amazon Elastic Container Registry (ECR), and leverages DevOps workflows to make container and Kubernetes security scalable, practical, and operational.

Security Across the Full Container Life Cycle

• Detect malicious activity in real time• Alert on or block attacks

• Secure the images • Assess the risk profile of assets

• Harden the environment• Reduce the attack surface

Page 2: Securing Kubernetes Workloads on AWS · 2020-04-22 · Securing Kubernetes Workloads on AWS As companies increasingly adopt DevOps practices and the cloud-native stack, they must

Request a demo today!

[email protected]+1 (650) 489-6769www.stackrox.com

StackRox helps enterprises secure their containers and Kubernetes environments at scale. The

StackRox Kubernetes Security Platform enables security and DevOps teams to enforce their

compliance and security policies across the entire container life cycle, from build to deploy to

runtime. StackRox integrates with existing DevOps and security tools, enabling teams to quickly

operationalize container and Kubernetes security. StackRox customers span cloud-native start-

ups Global 2000 enterprises, and government agencies.

LET’S GET STARTED

©2019 StackRox, Inc. All rights reserved.

Why StackRox

Richer context from Kubernetes

The StackRox platform evaluates risk using a

deployment-centric view, incorporating a wide variety

of factors derived from AWS services. CVEs aren’t

enough: the same vulnerability poses a higher risk in a

publicly exposed production service than in an isolated

development container. StackRox taps the declarative

data in Kubernetes to prioritize risk, improve visibility,

enhance compliance, and enrich all security use cases.

Native enforcement

Deep integration with AWS and Kubernetes enables the

StackRox platform to tap into the power of open source

development, providing a more robust, scalable

security. You get universal, portable controls and full

alignment between DevOps and Security. StackRox

leverages Kubernetes to contain and respond to

security issues, and our visualization and simulation

capabilities simplify network policy enforcement and

secrets management.

Continuous hardening

The feedback loop at the heart of the StackRox

platform applies learnings across the container life

cycle to constantly shrink the attack surface. Data from

build and deployment enables more accurate

detection, and runtime activity monitoring yields.

Visibility and Asset Management

Risk Profiling Response

Detection

Build/Deploy Runtime