Kubernetes Runtime Security

The Kubernetes open source cluster management system provides the mechanisms through which you interact with your cluster. You use Kubernetes commands and resources to deploy and manage your applications, perform administration tasks and set policies, and monitor the health of your deployed workloads. When you run a Kubernetes Engine cluster, …

Virtualization Security in Cloud Computing

Bringing VMs (virtual machines) onto the cloud has become increasingly popular. Recent years have seen great advancements in both cloud computing and virtualization. On one hand there is the ability to pool various resources to provide software-as-a-service, infrastructure-as-a-service and platform-as-a-service. At its most basic, this is what describes cloud computing. …

Cloud Survey Find Need for Better Security and Performance Monitoring

AccelOps announced findings from its recent survey of 176 IT security professionals conducted online and at the RSA Conference 2013. While 65 percent of respondents’ organizations are using cloud services today, only 46 percent have moved mission-critical applications and data outside the enterprise. Significant inhibitors remain in ensuring effective cloud …

Distributed Access Control Architecture for Cloud Computing

Cloud computing has specific security challenges as multi-tenancy and virtualization fea­tures create risks due to sharing of physical resources among potential untrusted tenant. Het­erogeneity of services also requires different degrees of granularity in access control mechanisms. This article discusses a distributed architecture based on principles from security management and software …

Clobbering the Cloud

Cloud Computing dominates the headlines these days but like most paradigm changes this introduces new risks and new opportunities for us to consider. Some deep technical research has gone into the underlying technologies (like Virtualization) but to some extent this serves only to muddy the waters when considering the overall …

Cloud Security Architecture from a Cloud Consumer’s Perspective

Developers have developed applications for IaaS (Amazon AWS, Rackspace, etc) and PaaS (Azure, Google App Engine, Cloud Foundry) Cloud platforms. These platforms provide basic security features including support for authentication, DoS attack mitigation, firewall policy management, logging, basic user and profile management but security concerns continue to be the number …