The Challenges of Adopting K8s for Production and Tips to Avoid Them

From its discreet debut in 2000 with the jail command introduced by FREEBSD, container technology is now firmly occupying the center stage of modern software delivery. Kubernetes is the de facto standard today for container orchestration and reputedly the best in the containerization space. And the timing is right for the platform, as Gartner has projected that by 2023, over 70% of global enterprises will be running two or more containerized applications -- up by 20% over last year.

Yet, Kubernetes remains complex to manage at enterprise scale, where workloads are heavy, and SLA compliance is critical. Even when Kubernetes is running smoothly in the test environment, running it in production needs to be approached with care to avoid pitfalls.

Five Security Best Practices for Kubernetes Deployments

The use of containers continues to rise in popularity in enterprise environments, increasing the need for a means to manage and orchestrate them. There’s no dispute that Kubernetes (K8s) has emerged as the market leader in container orchestration for cloud-native environments. 

Since Kubernetes plays a critical role in managing who and what could be done with containerized workloads, security should be well-understood and managed. It is therefore essential to use the right deployment architecture and security best practices for all deployments. 

Cybersecurity’s Emerging DevOps Challenge in 2020

Without properly shifting left, security will be left in the lurch.

As cloud technologies evolve and businesses jostle to become Agile, it’s time for cybersecurity to join the evolutionary race. Virtualization enabled physical data centers to transform, and cloud-based operating systems and application infrastructures served as the foundation for developers to access software resources without the headache of managing infrastructure.

However, cybersecurity has yet to take the bold step forward in line with the rest of the IT world. Security teams are expected to fight barehanded against hackers and malicious actors. Their traditional weapons such as firewalls, IPs, and host-based security tools are obsolete in the cloud, and cloud security tools that are meant to replace them are largely ineffectual.