Sysdig Introduces Sysdig Secure 3.0, the Industry’s First Kubernetes-Native Threat Prevention and Incident Response Tool
November 2019 by Patrick LEBRETON
New features enable enterprises to deploy securely, block threats at runtime, and quickly triage alerts
Sysdig, Inc. announce Sysdig Secure 3.0. This is the industry’s first tool to provide enterprises with threat prevention at runtime using Kubernetes-native Pod Security Policies (PSP). PSPs are controls in Kubernetes that define the security conditions pods must follow in order to run. Sysdig Secure 3.0 also includes the first incident response and audit tool for Kubernetes, giving enterprises the ability to reconstruct historical system activity. Enabling these capabilities are three new features: Kubernetes Policy Advisor, Falco Tuning, and Activity Audit. This release focuses on securing Kubernetes environments throughout the entire lifespan — detecting vulnerabilities and misconfigurations during the build phase, blocking threats without impacting performance during the run phase, and enabling incident response, forensics, and audit.
Kubernetes is the de facto operating system of cloud; however, as organizations move workloads into production, security and visibility are the biggest barriers. Traditional tools and processes do not provide visibility with context for Kubernetes environments. Additionally, traditional roles are shifting as security is embedded across the build, run, and respond phases of the application lifecycle. In order to ensure secure and compliant containerized applications, enterprises are moving away from siloed functions and introducing a secure DevOps workflow.
A recent report by Doug Cahill, Senior Analyst and Group Director covering cybersecurity at Enterprise Strategy Group, found that 66 percent of cybersecurity professionals expect to have adopted DevSecOps, also known as a secure DevOps approach, within the next two years. The report also found that half of the respondents expect their organization will consolidate controls by leveraging suites and platforms procured from a smaller set of vendors.
Key Features of Sysdig Secure 3.0
Kubernetes Policy Advisor introduces first runtime prevention tool
The time and expertise needed to manually configure security policies often result in costly misconfigurations. With the Kubernetes Policy Advisor, Sysdig Secure auto-generates Pod Security Policies (PSP) to significantly decrease the time spent configuring security. Strict security policies reduce risk, but can also break applications. Sysdig validates policies through simulations, enabling teams to adjust misconfigurations before shifting to production. By leveraging Kubernetes Policy Advisor to create these PSPs, DevOps teams have validated policies that can be enforced using native controls to prevent threats. This saves time and ensures a more secure environment.
Sysdig generates the policies and the Kubernetes platform manages enforcement, ensuring performance is not impacted. Tools that tamper with the container infrastructure, modify the host binaries and container images. These modifications can introduce security risks, which have the potential to significantly impact performance.
Falco Tuning reduces noise generated by false positives
Sysdig Secure is built on Falco, an open source Kubernetes runtime security project that was originally started by Sysdig and since Oct. 2018, it has been a CNCF® Sandbox Project. DevOps teams define security rules for pods using Falco syntax and receive alerts when rules are violated. Sysdig Secure extends Falco’s rich detection for easier security policy management. DevOps teams can reduce the noise from false positives by leveraging Sysdig Secure’s Falco Tuning capabilities. Falco Tuning analyzes recurring events and suggests changes to policies that reduce redundant alerts.
Activity Audit is the first Kubernetes-native tool for incident response
More than fifty percent of containers live less than five minutes; therefore, incident response in Kubernetes hinges on having access to forensics data that enables DevOps and security teams to quickly respond to security threats.
With Activity Audit, Sysdig Secure captures container activity, including commands, network connections, and Kubernetes API events, and correlates the information with application context and users or services from Kubernetes. SOC teams can search and filter this data for alert triage — to determine the cause of the anomaly — and for incident response. This also provides an audit logging process, a common requirement for Service Organization Control 2 (SOC 2), Payment Card Industry (PCI), International Organization for Standardization (ISO), and Health Insurance Portability and Accountability Act (HIPAA) compliance. With Sysdig Secure, enterprises have the ability to capture all activity information into a capture file for forensics, even if the container no longer exists, making Sysdig Secure the only Kubernetes incident response and audit solution available today.
“When operating containers, the only way to manage risk without slowing down the CI/CD pipeline is to embed security and compliance across the entire Kubernetes lifecycle,” said Suresh Vasudevan, Sysdig Chief Executive Officer. “Kubernetes has the ability to be more secure than VMs, but there are certain security and visibility elements enterprises must address, which includes adopting Kubernetes-native tools and a secure DevOps approach.”
Sysdig Secure combines Kubernetes application context with data from multiple sources to provide security from deployment through response. With Sysdig, enterprises can embed security, maximize availability, and validate compliance. Sysdig Secure is part of the Sysdig Secure DevOps Platform, which enables enterprises to confidently run cloud-native workloads in production. The Sysdig platform is open by design, with the scale, performance, and usability enterprises demand.