Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Tenable Delivers Zero Trust Cloud Functionality for Kubernetes

March 2024 by Marc Jacob

Tenable® announced expanded Tenable Cloud Security cloud-native application protection platform (CNAPP) capabilities for Kubernetes on-premises and public cloud environments. These latest advancements extend Tenable’s CNAPP benefits, such as contextual risk visibility, preventive security controls, and zero trust / least privilege enforcement, to Kubernetes.

Kubernetes, the de facto standard used by global organizations for cloud application development and container orchestration, is complex and difficult to properly configure and manage. This can lead to increased security risk and cloud exposures. In fact, nearly four in 10 (37%) organizations have experienced revenue or customer loss as the result of a Kubernetes security incident.1 Tenable Cloud Security eliminates the barrier to entry for developers, security professionals and security leaders alike by dramatically simplifying technical risk data into plain, easy to understand language.

Tenable Cloud Security is intuitive and highly scalable, helping organizations easily navigate any step on their cloud security journey. Customers gain the ability to prioritize their efforts with automated contextual risk analysis across the full cloud technology stack, as well as achieve least privilege at scale. The new Kubernetes features and functionality from Tenable Cloud Security enable organizations to:

● Scale Visibility Across Public and On-Premises Kubernetes Deployments: Protect Kubernetes clusters running on-premises, in private networks, as well as both managed and self-managed clusters with comprehensive visibility and reporting at scale. Unlock full visibility to the resources in a cluster, including workloads, users, role bindings, namespaces and beyond.
● Intercept Risky Deployments with Preventive Security Controls: Block non-compliant Kubernetes resource deployments with custom admission controller and custom zero trust security policies.
● Evade Long-Standing Privileges: Leverage least privilege policies and Just-in-Time (JIT) access to provide time-limited access and avoid long-standing privileges in Kubernetes clusters.


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts