SlideShare a Scribd company logo
1 of 30
Zero Trust Run-time
Kubernetes Security made
easy with AccuKnox
THE EASIEST WAY TO HAVE THE BEST OF BOTH WORLDS:
KUBERNETES + ZERO TRUST
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
The easiest way to have the best of both worlds:
Kubernetes + Zero Trust
OPPORTUNITY
Kubernetes is a powerful
orchestration technology for
deploying, scaling and
managing distributed
applications and it has taken
the industry by storm over the
past few years. However, due to
its inherent complexity,
relatively few enterprises have
been able to realize the full
value of Kubernetes: manage
their assets impeccably leave
alone securing them.
SOLUTION
Partnering with Stanford
Research Institute (SRI
International)’s innovations in
the areas of Container Security,
Anomaly Detection, Data
Provenance/Data Security,
AccuKnox has made Zero Trust
Run Time Security deployable
and usable by mainstream
enterprises.
“Container usage for production deployments in enterprises is
still constrained by concerns regarding security, monitoring,
data management and networking.”
— Gartner, Best Practices for Running Containers and
Kubernetes in Production, August 4, 2020.
“Container adoption is increasing, and security must come along for
the ride. Organizations value the scalability and agility that
containers offer, but containers introduce new security challenges
that can’t be addressed with traditional security and networking
tools. Commonly accepted security tools like vulnerability scanners,
network forensics, and endpoint detection and response (EDR) are
too heavyweight for a container environment. Security pros need
cloud native tools that are purpose-built for high scale, lightweight,
ephemeral container environments.”
— Best Practices for Container Security, Forrester Research,
July 24, 2020.
2
ISSUE
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
In the next few chapters,
we will go over:
3
Security Challenges in Kubernetes/Containers
1
What is Zero Trust?
2
Why is Identity the New Perimeter?
3
What is Run Time Security?
4
What is Data Security?
5
How does AccuKnox deliver Run Time Security?
6
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
Containers are transient
and ephemeral
4
EVOLUTION OF SERVER
WORKLOAD
ABSTRACTIONS
PHYSICAL
• Monolithic applications
• Physical servers as
unit of scaling
• Life span of years
VIRTUAL
MACHINES
• Hardware virtualization
• VMs as unit of scaling
• Life span of months
to years
CONTAINERS
• OS Virtualization
• Applications/services as
unit of scaling
• Life span of minutes to
days
SERVERLESS
Source: Gartner 2019
Security Challenges in Kubernetes/Containers
1
1 of 4
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
Containers are vulnerable
to zero-day attacks
5
Source: Gartner 2019
Kubernetes console was vulnerable, and
hackers were able to take control and find the
credentials to AWS cloud. They were able to
gain access to S3 buckets with sensitive
data, as well as run cryptocurrency mining in
Kubernetes pods.
Linux kernel vulnerability CVE-
2017-7308 can be used to change
the current process’s namespaces
into process 1’s and the host’s
namespaces by calling a Linux
kernel system call, allowing a full
escape to host.
An insecure Kubernetes cluster
console was found by scanning
publicly available IPs on
kubelet TCP port 10250
Exploited containers allowed
attackers to overwrite host runc
library and gain root access to
the container hosts
Security Challenges in Kubernetes/Containers
1
2 of 4
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX 6
Security Challenges in Kubernetes/Containers
1
3 of 4
Current
Perimeter Defenses
Firewalls, End Point
address only North-South
[17% of the traffic]
Current
Container Security Solutions
Do not have a mechanism to
affirmatively enforce Policy Compliance
DATA CENTER
DATA CENTER
Inter-container security
is rarely enforced
East–West
North–South
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX 7
Traditional approaches to Linux,
VM security like IPTables are not
effective and are not scalable/cost-
effective for securing large scale
container workloads
Security Challenges in Kubernetes/Containers
1
4 of 4
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
Zero Trust
Tenets
8
What is Zero Trust?
2
1. The network is always assumed to be hostile
2. Assume threat actors are already inside your network
3. Network locality (segmentation) is not sufficient for
deciding trust in a network
4. Every device, user and network flow is authenticated
and authorized
5. Policies must be dynamic and calculated from as many
sources of data as possible
6. The device is no longer the border. A user/service’
identity is the net border
7. Containers, serverless and cloud are the new
disruptors of traditional security architecture
ZERO TRUST ADAGE:
Verify…then Trust…
…continuously Verify
RONALD REAGAN:
Trust but verify.
[John Kindervag who coined the term Zero Trust]
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
Gurus have spoken! –
Embrace Zero Trust!
9
What is Zero Trust?
2
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
The Future has arrived! –
Identity is the New Perimeter!
10
Why is Identity the New
Perimeter?
3
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox Zero Trust
Security Platform
11
ASSETS
PROTECTED
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
ACCUKNOX
ENTERPRISE PLATFORM
ACCUKNOX PATENTED
INNOVATIONS DEVELOPED IN
PARTNERSHIP WITH STANFORD
RESEARCH INSTITUTE
OPEN SOURCE FOUNDATIONS
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox Zero Trust
Security Platform
12
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
AccuKnox is the industry’s most
comprehensive Zero Trust
Security platform that helps you
secure your current assets
(Network, Application, Data) and
your strategic future assets (API,
Serverless, IoT, 5G
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox Data Security,
Data Provenance
13
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
Based on 10+ years of Data Provenance research at
Stanford and helps you answer the following questions:
1. Which process [e.g., app] was used to create this data object
[e.g., file]?
2. When the process ran what were the other data object it wrote?
3. What data objects did the process read?
4. Could any data have flowed from this data object to that data object?
5. What is the sensitivity of a given data flow or connection
between processes?
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox Data Security,
Data Provenance
14
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox IoT/EDGE
Security
15
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
Due to the wide diversity of IoT devices the IoT security challenges
center around how to provide Agentless Diagnostics in a very
Heterogenous Environment. Unique aspects of IoTKnox include:
1. Passive Agent based device discovery
2. No modification to device firmware
3. Use of fingerprinting techniques to identify device make/model/application
4. Scan against well-known vulnerability database
5. Passive Agent connected to edge router
6. Can isolate a malicious device automatically
7. Anomaly Detection
8. SPIFFE Integration with last-mile protocols such as DNP3, DLMS/COSEM
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox 5G
Security
16
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
U.S. 5G Open Architecture is designed to enable
3rd party application ecosystem using a microservice
architecture framework.
• AccuKnox 5G Security facilitates System-level Policy Enforcement
and cloud-based security management for 5G environment
• AccuKnox core technologies can be applied to ensure security
compliance, monitoring, scalable policy policy generation and
management
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox Continuous
Compliance
17
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
Dynamic Inventory
enriched with:
• K8s Metadata
• L7 identity
Inventory
Out-of-the-box
Templates for
Industry-standard
compliance
frameworks (PCI,
SOC2, etc.)
K8s SIG-Policy
standards-based
Templates
Managed via
Kubernetes API and
kubectl cli
Allows creation of
internal Org-specific
templates
OSCAL Standards-
based Evidence
Reports
Easy integration with
existing GRC
Platforms
Accuknox UI and
Dashboard
Compliance, Security,
Platform and
Application team roles
Remediate
Audit
Define
Controls
Report
Audits linked to
dynamic strong L7
identity (x.509, jwt)
Audit system,
network and data
events
Correlation across
clusters and cloud
platforms
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox Policy
Management Lifecycle
18
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
Recommend
Preview
Stage /
Audit
Auto -
Generate
System
Network
Data
Unsecured
East-West
Access
Zero-Trust
(least-privilege)
whitelist
Policies
Commit
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox Policy
Management Lifecycle
19
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox
Micro-segmentation
20
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
Svc A
Svc C
Svc B Svc D
Svc X Svc Y Malware Svc P Svc Q Svc A
IdP
(OIDC)
x.
5
0
9
jwt
- Azure AD
- Okta
- Cloud AuthN
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox Enterprise
Integration
21
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
AccuKnox provides comprehensive
integration with 3rd party security platforms
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox Anomaly
Detection
22
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
AccuKnox provides un-supervised learning-
based Anomaly Detection to discover
malicious activity in large scale
Kubernetes environments
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox Policy
Management Foundations
23
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
AccuKnox leverages proven, opensource policy
management foundation platforms.
OPA (Open Policy Agent) is a Declarative,
Context-aware, Expressive, Fast, Portable policy
management framework. It allows you to decouple
policy from the service's code so you can release,
analyze, and review policies (which security and
compliance teams love) without sacrificing availability or
performance.
Kyverno is a policy engine designed for Kubernetes. It
can validate, mutate, and generate configurations using
admission controls and background scans. Kyverno
policies are Kubernetes resources and do not require
learning a new language. Kyverno is designed to work
with tools like kubectl, kustomize, and Git.
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox Identity
Management Foundations
24
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
AccuKnox uses very strong industry standard
Opensource platforms like SPIFFE and SPIRE for
User and Service Management, Attestation,
Enforcement, etc.
SPIFFE Secure Production Identity Framework for
Everyone, provides a secure identity, in the form of a
specially crafted X.509 certificate, to every workload in a
modern production environment. SPIFFE removes the
need for application-level authentication and complex
network-level ACL configuration.
SPIRE is a production-ready implementation of the
SPIFFE APIs that performs node and workload
attestation in order to securely issue SVIDs to
workloads, and verify the SVIDs of other workloads,
based on a predefined set of conditions.
SPIFFE and SPIRE were developed by Scytale, Inc
which was acquired by HPE in Feb 2020
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox
eBPF / Cilium
25
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
Cilium is opensource software for providing and transparently
securing network connectivity and load-balancing between
application workloads such as application containers or
processes. Cilium operates at Layer 3/4 to provide traditional
networking and security services as well as Layer 7 to protect
and secure use of modern application protocols such as HTTP,
gRPC and Kafka. Cilium is integrated into common
orchestration frameworks such as Kubernetes.
A new Linux kernel technology called eBPF (enhanced
Berkeley Packet Filter) is at the foundation of Cilium. It
supports dynamic insertion of eBPF bytecode into the Linux
kernel at various integration points such as: network IO,
application sockets, and tracepoints to implement security,
networking and visibility logic. eBPF is highly efficient and
flexible. To learn more about eBPF, visit eBPF.io.
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox
KubeArmor
26
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
KubeArmor is a Container-aware Runtime Security
Enforcement System. Developed and supported by
AccuKnox it has received wide acclaim and great
support from the opensource community.
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox Confidential
Computing/Enclave
27
CONTINUOUS COMPLIANCE
MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC
ZERO TRUST POLICY MANAGEMENT
MICRO-SEGMENTATION
ENTERPRISE INTEGRATION
SIEM, SOAR, SSO/RBAC
PRIVATE AND PUBLIC CLOUD
Network Application Data API Serverless IoT 5G
Data Security, Data Provenance
Un-supervised learning-based Anomaly Detection
OPA, Kyverno – Policy Management
SPIFFE – Identity Management Layer
eBPF / Cilium KubeArmor
Confidential Computing
/ Enclave
Gartner opines that by 2025, 50% of large
organizations will adopt privacy-enhancing
computation for processing data in untrusted
environments and multiparty data analytics use
cases.
Gartner has identified privacy-enhancing computation as a key
enterprise technology trend for 2021 and enabler for processing
and analyzing highly sensitive data.
The three pillars of data security involve protecting data at rest, in
transit, and in use. A number of tech leaders (AMD, ARM,
Facebook, Google, IBM, Microsoft, Oracle, Vmware) are
developing standards and are developing opensource tools.
AccuKnox will be embracing these in its efforts to deliver the
most comprehensive Zero Trust solution.
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox Zero Trust Security Platform –
How do we stack up?
28
Accuknox Brand A Brand B Brand C Brand C
Applicatio
n
(Container
/ Pod )
Runtime
Runtime application security on Kubernetes using LSM ✔✔✔ ✔✔✔
Secure Enclaves ✔✔✔
Recommendations and Policy Lifecycle Management ✔✔✔
Container and Vulnerability Scanning ✔✔ ✔✔✔
Container Forensics and VAE ✔✔✔ ✔ ✔✔✔
Container Compliance Templates ✔✔✔ ✔✔ ✔✔✔
Data
Runtime data security ✔✔✔
Data Provenance and Compliance templates ✔✔✔
Network
Kubernetes Network Policies ✔✔✔ ✔✔✔ ✔✔✔ ✔✔✔ ✔✔✔
Advanced Network Policy Semantics ✔✔✔ ✔✔✔ ✔✔✔
SPIFFE Identity integration for AuthN ✔✔✔ ✔✔✔ ✔✔✔ ✔✔✔
Recommendations and Policy Lifecycle Management
(Staged Policies)
✔✔✔ ✔ ✔✔✔ ✔✔✔ ✔
Support for L7 visibility and L7 policy controls ✔✔ ✔ ✔✔ ✔ ✔✔
Observability (Flow Viz, Telemetry, etc.) ✔✔✔ ✔✔ ✔✔✔ ✔✔✔ ✔
Network Forensics and Anomaly Detection ✔✔✔ ✔✔✔ ✔✔✔ ✔✔✔ ✔✔✔
Network Compliance Templates ✔✔✔ ✔✔ ✔✔✔ ✔✔✔ ✔
ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX
AccuKnox Zero Trust
Security Platform Summary
29
IN SUMMARY, WITH ACCUKNOX YOU CAN:
Isolate and protect every kind of container workload with
identity as a perimeter
Track tainted data and enable data provenance in a
container first world
Enable networking and system level restrictions over
containers to easily comply with a wide variety of
compliance needs
Enable enterprise grade container security with the best
of breed container security technologies – eBPF and LSM
Build container workloads to operate in Enclaves by
leveraging Confidential computing.
THE FOLLOWING ARE OUR KEY
DIFFERENTIATORS:
 Industry’s most Comprehensive Identity Driven Zero Trust
Solution for: Containers, Functions, API, Data, IoT, 5G
 Built on proven OpenSource products: OPA, Kyverno,
KubeArmor, SPIFFE, eBPF/Cilium
 Leverages seminal technologies from SRI in the areas of
Anomaly Detection, Container Security and Data
 Highly differentiated, patented innovation [10+ patents]
 Future Proof Product/Tech Roadmap
 Validation by Fortune 100 companies and Silicon Valley
Cloud Native Tech Leaders
 Seasoned team with a record of disciplined execution and
Customer/Partner Success
About AccuKnox
AccuKnox provides a Zero Trust Run-time Kubernetes Security platform. AccuKnox is built in
partnership with SRI (Stanford Research Institute) and is anchored on seminal inventions in the
areas of: Container Security, Anomaly Detection and Data Provenance. AccuKnox can be deployed
in Public and Private Cloud environments.
Visit www.accuknox.com

More Related Content

What's hot

Stargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動する
Stargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動するStargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動する
Stargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動するKohei Tokunaga
 
PCIDSSで学ぶNeuVectorの基礎(Kubernetes Novice Tokyo #21 発表資料)
PCIDSSで学ぶNeuVectorの基礎(Kubernetes Novice Tokyo #21 発表資料)PCIDSSで学ぶNeuVectorの基礎(Kubernetes Novice Tokyo #21 発表資料)
PCIDSSで学ぶNeuVectorの基礎(Kubernetes Novice Tokyo #21 発表資料)NTT DATA Technology & Innovation
 
忙しい人の5分で分かるDocker 2017年春Ver
忙しい人の5分で分かるDocker 2017年春Ver忙しい人の5分で分かるDocker 2017年春Ver
忙しい人の5分で分かるDocker 2017年春VerMasahito Zembutsu
 
Hybrid Azure AD Join 動作の仕組みを徹底解説
Hybrid Azure AD Join 動作の仕組みを徹底解説Hybrid Azure AD Join 動作の仕組みを徹底解説
Hybrid Azure AD Join 動作の仕組みを徹底解説Yusuke Kodama
 
Azure Service Fabric 概要
Azure Service Fabric 概要Azure Service Fabric 概要
Azure Service Fabric 概要Daiyu Hatakeyama
 
Azure Artifactsを触ってみよう
Azure Artifactsを触ってみようAzure Artifactsを触ってみよう
Azure Artifactsを触ってみようDevTakas
 
Continues Integration and Continuous Delivery with Azure DevOps - Deploy Anyt...
Continues Integration and Continuous Delivery with Azure DevOps - Deploy Anyt...Continues Integration and Continuous Delivery with Azure DevOps - Deploy Anyt...
Continues Integration and Continuous Delivery with Azure DevOps - Deploy Anyt...Janusz Nowak
 
[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy☁ Hicham KADIRI ☁
 
Using Azure DevOps to continuously build, test, and deploy containerized appl...
Using Azure DevOps to continuously build, test, and deploy containerized appl...Using Azure DevOps to continuously build, test, and deploy containerized appl...
Using Azure DevOps to continuously build, test, and deploy containerized appl...Adrian Todorov
 
AnsibleによるInfrastructure as code入門
AnsibleによるInfrastructure as code入門AnsibleによるInfrastructure as code入門
AnsibleによるInfrastructure as code入門kk_Ataka
 
DevOps overview and tech interview tips
DevOps overview and tech interview tipsDevOps overview and tech interview tips
DevOps overview and tech interview tipsDaniel Bezerra
 
Azure DevOpsとセキュリティ
Azure DevOpsとセキュリティAzure DevOpsとセキュリティ
Azure DevOpsとセキュリティKazushi Kamegawa
 
「DNS浸透いうな」と言うけれど… (#ssmjp 2018/07)
「DNS浸透いうな」と言うけれど… (#ssmjp 2018/07)「DNS浸透いうな」と言うけれど… (#ssmjp 2018/07)
「DNS浸透いうな」と言うけれど… (#ssmjp 2018/07)Yoshikazu GOTO
 
Kubernetes Workshop
Kubernetes WorkshopKubernetes Workshop
Kubernetes Workshoploodse
 
サポート エンジニアが Azure Networking をじっくりたっぷり語りつくす会
サポート エンジニアが Azure Networking をじっくりたっぷり語りつくす会サポート エンジニアが Azure Networking をじっくりたっぷり語りつくす会
サポート エンジニアが Azure Networking をじっくりたっぷり語りつくす会ShuheiUda
 
週末趣味のAWS VPC Traffic Mirroring
週末趣味のAWS VPC Traffic Mirroring週末趣味のAWS VPC Traffic Mirroring
週末趣味のAWS VPC Traffic MirroringNamba Kazuo
 
俺の俺による俺のための App Service Environment
俺の俺による俺のための App Service Environment俺の俺による俺のための App Service Environment
俺の俺による俺のための App Service EnvironmentSunao Tomita
 
Azure DevOps CI/CD For Beginners
Azure DevOps CI/CD  For BeginnersAzure DevOps CI/CD  For Beginners
Azure DevOps CI/CD For BeginnersRahul Nath
 
「Photon OS + Docker」VLAN 環境の構築
「Photon OS + Docker」VLAN 環境の構築「Photon OS + Docker」VLAN 環境の構築
「Photon OS + Docker」VLAN 環境の構築Fuva Brain
 

What's hot (20)

Stargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動する
Stargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動するStargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動する
Stargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動する
 
PCIDSSで学ぶNeuVectorの基礎(Kubernetes Novice Tokyo #21 発表資料)
PCIDSSで学ぶNeuVectorの基礎(Kubernetes Novice Tokyo #21 発表資料)PCIDSSで学ぶNeuVectorの基礎(Kubernetes Novice Tokyo #21 発表資料)
PCIDSSで学ぶNeuVectorの基礎(Kubernetes Novice Tokyo #21 発表資料)
 
忙しい人の5分で分かるDocker 2017年春Ver
忙しい人の5分で分かるDocker 2017年春Ver忙しい人の5分で分かるDocker 2017年春Ver
忙しい人の5分で分かるDocker 2017年春Ver
 
Hybrid Azure AD Join 動作の仕組みを徹底解説
Hybrid Azure AD Join 動作の仕組みを徹底解説Hybrid Azure AD Join 動作の仕組みを徹底解説
Hybrid Azure AD Join 動作の仕組みを徹底解説
 
Azure Service Fabric 概要
Azure Service Fabric 概要Azure Service Fabric 概要
Azure Service Fabric 概要
 
Azure Artifactsを触ってみよう
Azure Artifactsを触ってみようAzure Artifactsを触ってみよう
Azure Artifactsを触ってみよう
 
Continues Integration and Continuous Delivery with Azure DevOps - Deploy Anyt...
Continues Integration and Continuous Delivery with Azure DevOps - Deploy Anyt...Continues Integration and Continuous Delivery with Azure DevOps - Deploy Anyt...
Continues Integration and Continuous Delivery with Azure DevOps - Deploy Anyt...
 
[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy
 
Using Azure DevOps to continuously build, test, and deploy containerized appl...
Using Azure DevOps to continuously build, test, and deploy containerized appl...Using Azure DevOps to continuously build, test, and deploy containerized appl...
Using Azure DevOps to continuously build, test, and deploy containerized appl...
 
AnsibleによるInfrastructure as code入門
AnsibleによるInfrastructure as code入門AnsibleによるInfrastructure as code入門
AnsibleによるInfrastructure as code入門
 
DevOps overview and tech interview tips
DevOps overview and tech interview tipsDevOps overview and tech interview tips
DevOps overview and tech interview tips
 
Azure DevOpsとセキュリティ
Azure DevOpsとセキュリティAzure DevOpsとセキュリティ
Azure DevOpsとセキュリティ
 
「DNS浸透いうな」と言うけれど… (#ssmjp 2018/07)
「DNS浸透いうな」と言うけれど… (#ssmjp 2018/07)「DNS浸透いうな」と言うけれど… (#ssmjp 2018/07)
「DNS浸透いうな」と言うけれど… (#ssmjp 2018/07)
 
Azure DevOps
Azure DevOpsAzure DevOps
Azure DevOps
 
Kubernetes Workshop
Kubernetes WorkshopKubernetes Workshop
Kubernetes Workshop
 
サポート エンジニアが Azure Networking をじっくりたっぷり語りつくす会
サポート エンジニアが Azure Networking をじっくりたっぷり語りつくす会サポート エンジニアが Azure Networking をじっくりたっぷり語りつくす会
サポート エンジニアが Azure Networking をじっくりたっぷり語りつくす会
 
週末趣味のAWS VPC Traffic Mirroring
週末趣味のAWS VPC Traffic Mirroring週末趣味のAWS VPC Traffic Mirroring
週末趣味のAWS VPC Traffic Mirroring
 
俺の俺による俺のための App Service Environment
俺の俺による俺のための App Service Environment俺の俺による俺のための App Service Environment
俺の俺による俺のための App Service Environment
 
Azure DevOps CI/CD For Beginners
Azure DevOps CI/CD  For BeginnersAzure DevOps CI/CD  For Beginners
Azure DevOps CI/CD For Beginners
 
「Photon OS + Docker」VLAN 環境の構築
「Photon OS + Docker」VLAN 環境の構築「Photon OS + Docker」VLAN 環境の構築
「Photon OS + Docker」VLAN 環境の構築
 

Similar to Zero Trust Run-time Kubernetes Security made easy with AccuKnox

Forging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesForging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesPanoptica
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing GlobalSign
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewSteven Russo
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyHappiest Minds Technologies
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Security threats with Kubernetes - Igor Khoroshchenko
 Security threats with Kubernetes - Igor Khoroshchenko Security threats with Kubernetes - Igor Khoroshchenko
Security threats with Kubernetes - Igor KhoroshchenkoKuberton
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingCharles "Chuck" Speicher Jr.
 
The Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on KubernetesThe Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on KubernetesJacopo Nardiello
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSEric Smalling
 
[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical DeviceICS
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021lior mazor
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour BrochureBlock Armour
 

Similar to Zero Trust Run-time Kubernetes Security made easy with AccuKnox (20)

Forging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesForging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for Enterprises
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network Secuirty
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Security threats with Kubernetes - Igor Khoroshchenko
 Security threats with Kubernetes - Igor Khoroshchenko Security threats with Kubernetes - Igor Khoroshchenko
Security threats with Kubernetes - Igor Khoroshchenko
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Zero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOpsZero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOps
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
The Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on KubernetesThe Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on Kubernetes
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWS
 
[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Zero Trust Run-time Kubernetes Security made easy with AccuKnox

  • 1. Zero Trust Run-time Kubernetes Security made easy with AccuKnox THE EASIEST WAY TO HAVE THE BEST OF BOTH WORLDS: KUBERNETES + ZERO TRUST
  • 2. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX The easiest way to have the best of both worlds: Kubernetes + Zero Trust OPPORTUNITY Kubernetes is a powerful orchestration technology for deploying, scaling and managing distributed applications and it has taken the industry by storm over the past few years. However, due to its inherent complexity, relatively few enterprises have been able to realize the full value of Kubernetes: manage their assets impeccably leave alone securing them. SOLUTION Partnering with Stanford Research Institute (SRI International)’s innovations in the areas of Container Security, Anomaly Detection, Data Provenance/Data Security, AccuKnox has made Zero Trust Run Time Security deployable and usable by mainstream enterprises. “Container usage for production deployments in enterprises is still constrained by concerns regarding security, monitoring, data management and networking.” — Gartner, Best Practices for Running Containers and Kubernetes in Production, August 4, 2020. “Container adoption is increasing, and security must come along for the ride. Organizations value the scalability and agility that containers offer, but containers introduce new security challenges that can’t be addressed with traditional security and networking tools. Commonly accepted security tools like vulnerability scanners, network forensics, and endpoint detection and response (EDR) are too heavyweight for a container environment. Security pros need cloud native tools that are purpose-built for high scale, lightweight, ephemeral container environments.” — Best Practices for Container Security, Forrester Research, July 24, 2020. 2 ISSUE
  • 3. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX In the next few chapters, we will go over: 3 Security Challenges in Kubernetes/Containers 1 What is Zero Trust? 2 Why is Identity the New Perimeter? 3 What is Run Time Security? 4 What is Data Security? 5 How does AccuKnox deliver Run Time Security? 6
  • 4. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX Containers are transient and ephemeral 4 EVOLUTION OF SERVER WORKLOAD ABSTRACTIONS PHYSICAL • Monolithic applications • Physical servers as unit of scaling • Life span of years VIRTUAL MACHINES • Hardware virtualization • VMs as unit of scaling • Life span of months to years CONTAINERS • OS Virtualization • Applications/services as unit of scaling • Life span of minutes to days SERVERLESS Source: Gartner 2019 Security Challenges in Kubernetes/Containers 1 1 of 4
  • 5. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX Containers are vulnerable to zero-day attacks 5 Source: Gartner 2019 Kubernetes console was vulnerable, and hackers were able to take control and find the credentials to AWS cloud. They were able to gain access to S3 buckets with sensitive data, as well as run cryptocurrency mining in Kubernetes pods. Linux kernel vulnerability CVE- 2017-7308 can be used to change the current process’s namespaces into process 1’s and the host’s namespaces by calling a Linux kernel system call, allowing a full escape to host. An insecure Kubernetes cluster console was found by scanning publicly available IPs on kubelet TCP port 10250 Exploited containers allowed attackers to overwrite host runc library and gain root access to the container hosts Security Challenges in Kubernetes/Containers 1 2 of 4
  • 6. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX 6 Security Challenges in Kubernetes/Containers 1 3 of 4 Current Perimeter Defenses Firewalls, End Point address only North-South [17% of the traffic] Current Container Security Solutions Do not have a mechanism to affirmatively enforce Policy Compliance DATA CENTER DATA CENTER Inter-container security is rarely enforced East–West North–South
  • 7. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX 7 Traditional approaches to Linux, VM security like IPTables are not effective and are not scalable/cost- effective for securing large scale container workloads Security Challenges in Kubernetes/Containers 1 4 of 4
  • 8. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX Zero Trust Tenets 8 What is Zero Trust? 2 1. The network is always assumed to be hostile 2. Assume threat actors are already inside your network 3. Network locality (segmentation) is not sufficient for deciding trust in a network 4. Every device, user and network flow is authenticated and authorized 5. Policies must be dynamic and calculated from as many sources of data as possible 6. The device is no longer the border. A user/service’ identity is the net border 7. Containers, serverless and cloud are the new disruptors of traditional security architecture ZERO TRUST ADAGE: Verify…then Trust… …continuously Verify RONALD REAGAN: Trust but verify. [John Kindervag who coined the term Zero Trust]
  • 9. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX Gurus have spoken! – Embrace Zero Trust! 9 What is Zero Trust? 2
  • 10. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX The Future has arrived! – Identity is the New Perimeter! 10 Why is Identity the New Perimeter? 3
  • 11. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox Zero Trust Security Platform 11 ASSETS PROTECTED CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave ACCUKNOX ENTERPRISE PLATFORM ACCUKNOX PATENTED INNOVATIONS DEVELOPED IN PARTNERSHIP WITH STANFORD RESEARCH INSTITUTE OPEN SOURCE FOUNDATIONS
  • 12. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox Zero Trust Security Platform 12 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave AccuKnox is the industry’s most comprehensive Zero Trust Security platform that helps you secure your current assets (Network, Application, Data) and your strategic future assets (API, Serverless, IoT, 5G
  • 13. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox Data Security, Data Provenance 13 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave Based on 10+ years of Data Provenance research at Stanford and helps you answer the following questions: 1. Which process [e.g., app] was used to create this data object [e.g., file]? 2. When the process ran what were the other data object it wrote? 3. What data objects did the process read? 4. Could any data have flowed from this data object to that data object? 5. What is the sensitivity of a given data flow or connection between processes?
  • 14. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox Data Security, Data Provenance 14 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave
  • 15. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox IoT/EDGE Security 15 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave Due to the wide diversity of IoT devices the IoT security challenges center around how to provide Agentless Diagnostics in a very Heterogenous Environment. Unique aspects of IoTKnox include: 1. Passive Agent based device discovery 2. No modification to device firmware 3. Use of fingerprinting techniques to identify device make/model/application 4. Scan against well-known vulnerability database 5. Passive Agent connected to edge router 6. Can isolate a malicious device automatically 7. Anomaly Detection 8. SPIFFE Integration with last-mile protocols such as DNP3, DLMS/COSEM
  • 16. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox 5G Security 16 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave U.S. 5G Open Architecture is designed to enable 3rd party application ecosystem using a microservice architecture framework. • AccuKnox 5G Security facilitates System-level Policy Enforcement and cloud-based security management for 5G environment • AccuKnox core technologies can be applied to ensure security compliance, monitoring, scalable policy policy generation and management
  • 17. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox Continuous Compliance 17 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave Dynamic Inventory enriched with: • K8s Metadata • L7 identity Inventory Out-of-the-box Templates for Industry-standard compliance frameworks (PCI, SOC2, etc.) K8s SIG-Policy standards-based Templates Managed via Kubernetes API and kubectl cli Allows creation of internal Org-specific templates OSCAL Standards- based Evidence Reports Easy integration with existing GRC Platforms Accuknox UI and Dashboard Compliance, Security, Platform and Application team roles Remediate Audit Define Controls Report Audits linked to dynamic strong L7 identity (x.509, jwt) Audit system, network and data events Correlation across clusters and cloud platforms
  • 18. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox Policy Management Lifecycle 18 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave Recommend Preview Stage / Audit Auto - Generate System Network Data Unsecured East-West Access Zero-Trust (least-privilege) whitelist Policies Commit
  • 19. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox Policy Management Lifecycle 19 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave
  • 20. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox Micro-segmentation 20 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave Svc A Svc C Svc B Svc D Svc X Svc Y Malware Svc P Svc Q Svc A IdP (OIDC) x. 5 0 9 jwt - Azure AD - Okta - Cloud AuthN
  • 21. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox Enterprise Integration 21 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave AccuKnox provides comprehensive integration with 3rd party security platforms
  • 22. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox Anomaly Detection 22 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave AccuKnox provides un-supervised learning- based Anomaly Detection to discover malicious activity in large scale Kubernetes environments
  • 23. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox Policy Management Foundations 23 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave AccuKnox leverages proven, opensource policy management foundation platforms. OPA (Open Policy Agent) is a Declarative, Context-aware, Expressive, Fast, Portable policy management framework. It allows you to decouple policy from the service's code so you can release, analyze, and review policies (which security and compliance teams love) without sacrificing availability or performance. Kyverno is a policy engine designed for Kubernetes. It can validate, mutate, and generate configurations using admission controls and background scans. Kyverno policies are Kubernetes resources and do not require learning a new language. Kyverno is designed to work with tools like kubectl, kustomize, and Git.
  • 24. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox Identity Management Foundations 24 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave AccuKnox uses very strong industry standard Opensource platforms like SPIFFE and SPIRE for User and Service Management, Attestation, Enforcement, etc. SPIFFE Secure Production Identity Framework for Everyone, provides a secure identity, in the form of a specially crafted X.509 certificate, to every workload in a modern production environment. SPIFFE removes the need for application-level authentication and complex network-level ACL configuration. SPIRE is a production-ready implementation of the SPIFFE APIs that performs node and workload attestation in order to securely issue SVIDs to workloads, and verify the SVIDs of other workloads, based on a predefined set of conditions. SPIFFE and SPIRE were developed by Scytale, Inc which was acquired by HPE in Feb 2020
  • 25. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox eBPF / Cilium 25 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave Cilium is opensource software for providing and transparently securing network connectivity and load-balancing between application workloads such as application containers or processes. Cilium operates at Layer 3/4 to provide traditional networking and security services as well as Layer 7 to protect and secure use of modern application protocols such as HTTP, gRPC and Kafka. Cilium is integrated into common orchestration frameworks such as Kubernetes. A new Linux kernel technology called eBPF (enhanced Berkeley Packet Filter) is at the foundation of Cilium. It supports dynamic insertion of eBPF bytecode into the Linux kernel at various integration points such as: network IO, application sockets, and tracepoints to implement security, networking and visibility logic. eBPF is highly efficient and flexible. To learn more about eBPF, visit eBPF.io.
  • 26. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox KubeArmor 26 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave KubeArmor is a Container-aware Runtime Security Enforcement System. Developed and supported by AccuKnox it has received wide acclaim and great support from the opensource community.
  • 27. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox Confidential Computing/Enclave 27 CONTINUOUS COMPLIANCE MITRE, NIST, PCI, GDPR, CCPA, HIPAA, SOC2, NERC, FERC ZERO TRUST POLICY MANAGEMENT MICRO-SEGMENTATION ENTERPRISE INTEGRATION SIEM, SOAR, SSO/RBAC PRIVATE AND PUBLIC CLOUD Network Application Data API Serverless IoT 5G Data Security, Data Provenance Un-supervised learning-based Anomaly Detection OPA, Kyverno – Policy Management SPIFFE – Identity Management Layer eBPF / Cilium KubeArmor Confidential Computing / Enclave Gartner opines that by 2025, 50% of large organizations will adopt privacy-enhancing computation for processing data in untrusted environments and multiparty data analytics use cases. Gartner has identified privacy-enhancing computation as a key enterprise technology trend for 2021 and enabler for processing and analyzing highly sensitive data. The three pillars of data security involve protecting data at rest, in transit, and in use. A number of tech leaders (AMD, ARM, Facebook, Google, IBM, Microsoft, Oracle, Vmware) are developing standards and are developing opensource tools. AccuKnox will be embracing these in its efforts to deliver the most comprehensive Zero Trust solution.
  • 28. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox Zero Trust Security Platform – How do we stack up? 28 Accuknox Brand A Brand B Brand C Brand C Applicatio n (Container / Pod ) Runtime Runtime application security on Kubernetes using LSM ✔✔✔ ✔✔✔ Secure Enclaves ✔✔✔ Recommendations and Policy Lifecycle Management ✔✔✔ Container and Vulnerability Scanning ✔✔ ✔✔✔ Container Forensics and VAE ✔✔✔ ✔ ✔✔✔ Container Compliance Templates ✔✔✔ ✔✔ ✔✔✔ Data Runtime data security ✔✔✔ Data Provenance and Compliance templates ✔✔✔ Network Kubernetes Network Policies ✔✔✔ ✔✔✔ ✔✔✔ ✔✔✔ ✔✔✔ Advanced Network Policy Semantics ✔✔✔ ✔✔✔ ✔✔✔ SPIFFE Identity integration for AuthN ✔✔✔ ✔✔✔ ✔✔✔ ✔✔✔ Recommendations and Policy Lifecycle Management (Staged Policies) ✔✔✔ ✔ ✔✔✔ ✔✔✔ ✔ Support for L7 visibility and L7 policy controls ✔✔ ✔ ✔✔ ✔ ✔✔ Observability (Flow Viz, Telemetry, etc.) ✔✔✔ ✔✔ ✔✔✔ ✔✔✔ ✔ Network Forensics and Anomaly Detection ✔✔✔ ✔✔✔ ✔✔✔ ✔✔✔ ✔✔✔ Network Compliance Templates ✔✔✔ ✔✔ ✔✔✔ ✔✔✔ ✔
  • 29. ZERO TRUST RUN-TIME KUBERNETES SECURITY MADE EASY WITH ACCUKNOX AccuKnox Zero Trust Security Platform Summary 29 IN SUMMARY, WITH ACCUKNOX YOU CAN: Isolate and protect every kind of container workload with identity as a perimeter Track tainted data and enable data provenance in a container first world Enable networking and system level restrictions over containers to easily comply with a wide variety of compliance needs Enable enterprise grade container security with the best of breed container security technologies – eBPF and LSM Build container workloads to operate in Enclaves by leveraging Confidential computing. THE FOLLOWING ARE OUR KEY DIFFERENTIATORS:  Industry’s most Comprehensive Identity Driven Zero Trust Solution for: Containers, Functions, API, Data, IoT, 5G  Built on proven OpenSource products: OPA, Kyverno, KubeArmor, SPIFFE, eBPF/Cilium  Leverages seminal technologies from SRI in the areas of Anomaly Detection, Container Security and Data  Highly differentiated, patented innovation [10+ patents]  Future Proof Product/Tech Roadmap  Validation by Fortune 100 companies and Silicon Valley Cloud Native Tech Leaders  Seasoned team with a record of disciplined execution and Customer/Partner Success
  • 30. About AccuKnox AccuKnox provides a Zero Trust Run-time Kubernetes Security platform. AccuKnox is built in partnership with SRI (Stanford Research Institute) and is anchored on seminal inventions in the areas of: Container Security, Anomaly Detection and Data Provenance. AccuKnox can be deployed in Public and Private Cloud environments. Visit www.accuknox.com