DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Enterprise AI Trend Report: Gain insights on ethical AI, MLOps, generative AI, large language models, and much more.

2024 Cloud survey: Share your insights on microservices, containers, K8s, CI/CD, and DevOps (+ enter a $750 raffle!) for our Trend Reports.

PostgreSQL: Learn about the open-source RDBMS' advanced capabilities, core components, common commands and functions, and general DBA tasks.

AI Automation Essentials. Check out the latest Refcard on all things AI automation, including model training, data security, and more.

Core Badge
Avatar

Akanksha Pathak

DZone Core CORE

Senior Cybersecurity Consultant at Visa Inc

Austin, US

Joined Feb 2023

https://pathakakanksha991.wixsite.com/cybersecurity

About

Akanksha Pathak is a Cybersecurity Consultant specializing in Cloud Security, Application Security, Threat Analysis & Response, Vulnerability Management, and Product Security. As a senior member of the corporate governance team, she oversees the third-party cybersecurity practice. Her expertise lies in managing supplier relationships while also architecting and analyzing application designs. Additionally, she is an active participant in many cybersecurity communities, such as the GIAC Advisory Board meeting. Working in a challenging environment has helped her to gain a critical thinking approach with an entrepreneurial mindset, keeping IT security a crucial criterion.

Stats

Reputation: 429
Pageviews: 38.0K
Articles: 7
Comments: 1
  • Articles
  • Trend Reports
  • Events
  • Comments

Articles

article thumbnail
Modern DevSecOps: Benefits, Challenges, and Integrations To Achieve DevSecOps Excellence
In this article, explore the benefits, challenges, and integrations that are a part of achieving DevSecOps excellence.
December 15, 2023
· 5,251 Views · 3 Likes
article thumbnail
Secure the Cluster: A Blazing Kubernetes Developer’s Guide to Security
This article will serve as a comprehensive guide to Kubernetes security, aimed at helping developers protect their applications and data.
October 24, 2023
· 5,423 Views · 3 Likes
article thumbnail
Risk Assessment Using Blockchain
To understand how blockchain can help in this area, it is important to understand the technicalities behind this technology.
July 3, 2023
· 4,823 Views · 2 Likes
article thumbnail
A Practical Guide for Container Security: Trends and Strategies for 2023
Explore container security's fundamental principles and strategies, learn 2 specific methods, and examine tools and techniques for securing keys, tokens, and passwords.
June 9, 2023
· 9,216 Views · 5 Likes
article thumbnail
Container Security: Don't Let Your Guard Down
To comprehend the security implications of a containerized environment, it is crucial to understand the fundamental elements of a container deployment network.
March 16, 2023
· 6,633 Views · 4 Likes
article thumbnail
Guarding Against Threats: Examining the Strengths and Applications of Modern Security Models
It is crucial to know the different security models, their features, and their suitability for specific situations.
March 13, 2023
· 2,740 Views · 2 Likes
article thumbnail
Security Architecture Review on a SASE Solution
Recent trends suggest that organizations are now moving to SASE solutions, replacing existing vendors that provide services like CASB, DLP, proxy solutions, etc.
February 28, 2023
· 3,896 Views · 2 Likes

Trend Reports

Trend Report

Enterprise Security

This year has observed a rise in the sophistication and nuance of approaches to security that far surpass the years prior, with software supply chains being at the top of that list. Each year, DZone investigates the state of application security, and our global developer community is seeing both more automation and solutions for data protection and threat detection as well as a more common security-forward mindset that seeks to understand the Why.In our 2023 Enterprise Security Trend Report, we dive deeper into the greatest advantages and threats to application security today, including the role of software supply chains, infrastructure security, threat detection, automation and AI, and DevSecOps. Featured in this report are insights from our original research and related articles written by members of the DZone Community — read on to learn more!

Enterprise Security

Trend Report

Kubernetes in the Enterprise

Kubernetes: it’s everywhere. To fully capture or articulate the prevalence and far-reaching impacts of this monumental platform is no small task — from its initial aims to manage and orchestrate containers to the more nuanced techniques to scale deployments, leverage data and AI/ML capabilities, and manage observability and performance — it’s no wonder we, DZone, research and cover the Kubernetes ecosystem at great lengths each year.In our 2023 Kubernetes in the Enterprise Trend Report, we further dive into Kubernetes over the last year, its core usages as well as emerging trends (and challenges), and what these all mean for our developer and tech community. Featured in this report are actionable observations from our original research, expert content written by members of the DZone Community, and other helpful resources to help you go forth in your organizations, projects, and repos with deeper knowledge of and skills for using Kubernetes.

Kubernetes in the Enterprise

Trend Report

Containers

The proliferation of containers in recent years has increased the speed, portability, and scalability of software infrastructure and deployments across all kinds of application architectures and cloud-native environments. Now, with more and more organizations migrated to the cloud, what's next? The subsequent need to efficiently manage and monitor containerized environments remains a crucial task for teams. With organizations looking to better leverage their containers — and some still working to migrate out of their own monolithic environments — the path to containerization and architectural modernization remains a perpetual climb. In DZone's 2023 Containers Trend Report, we will explore the current state of containers, key trends and advancements in global containerization strategies, and constructive content for modernizing your software architecture. This will be examined through DZone-led research, expert community articles, and other helpful resources for designing and building containerized applications.

Containers

Events

Watch

On Demand Event Thumbnail

Kubernetes in the Enterprise: Redefining the Container Ecosystem

Presenter: DZone in partnership with Platform 9

Watch

On Demand Event Thumbnail

Containers: Moderization and Advancements in Cloud-Native Development

Presenter: D2iQ

Comments

Container Security: Don't Let Your Guard Down

Mar 26, 2023 · Akanksha Pathak

Thank you for your feedback, John. However, please note that this article is not intended to cover the security aspects of a specific Kubernetes version. It is about container security in general and which steps can organizations take to reduce exposure.

As mentioned, Kubernetes is only meant to serve as an example to help readers understand the basic components and high level architecture of a container orchestration platform. Please note, while I agree that in later versions, master label is no more used and the term "master" has been deprecated in Kubernetes following version 1.20, using "control plane" instead, it was mainly to promote more inclusive language in the Kubernetes community. However, it is important to note that while the term "master" has been deprecated in Kubernetes, it is used in legacy systems, documentation, or discussions. The attempt is to make terminologies clear for everyone. For detailed information on Kubernetes cluster, a link is provided in the article.

For virtual switches, while K8 often uses the term CNIs, which provide a virtual network interface for each container, OpenShift uses "virtual switches" to refer to the virtual network interfaces used by containers. Additionally, Docker Swarm uses a built-in virtual switch called the "overlay network" to provide networking between containers running on different hosts and Microsoft Azure Container Service uses a virtual switch to provide networking between containers running on different hosts.

I would challenge the statement, "VPN on host OS is not a thing". Installing a VPN on the host operating system with right configuration and management can provide an additional layer of security for containers running on that host.

While PSA (Platform Security Architecture) policies are guidelines for building secure devices, they are not a substitute for security assessment. Security assessment is the process of evaluating the security of a device or application, typically using a combination of automated tools and manual testing. Security assessment can help identify vulnerabilities and weaknesses that may not be covered by PSA policies, and can provide a more comprehensive evaluation of security.

Finally, the article is written for organizations deploying containers in general and not specific to any particular version of Kubernetes. While K8 is one of the container orchestration platform, there are many others in the market like Docker Swarm, EKS, AKS, OpenShift, etc. Remember that the article mainly focuses on security and not container implementation process.

User has been successfully modified

Failed to modify user

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: