Cloud cost management platform provider Cast AI has released Cloud Security Insights, a free security analysis tool that integrates into its enterprise AI-powered cloud optimization platform.
The platform, free for all users, aims to help DevOps and DevSecOps teams manage cloud resources and improve cloud and Kubernetes security.
It represents the second pillar of Cast AI’s standalone Kubernetes management platform, as well as the toolkit for automating Kubernetes cost reduction, cloud resource provisioning, and security monitoring across Google Cloud, Amazon Web Services (AWS), and Microsoft Azure.
The vendor-independent platform provides users with fully automated reports containing Kubernetes configuration checks, which help ensure groups are configured according to best practices for centuries and workloads. The user interface provided details about individual checks and resources.
The platform also provides vulnerability scans to get an overview of potential issues that might arise due to container images downloaded from public logs, as well as providing 24/7 visibility into Kubernetes cluster configurations.
In addition, the detection of vulnerabilities in the container image and the provision of security recommendations can be arranged in order of priority.
Other features help users achieve security and regulatory compliance, and provide a common platform for security team integration, development, and collaboration.
“In addition to comprehensive cost monitoring, you are now provided with individually tailored security recommendations to mitigate cloud-native workload security issues,” explains Cast AI co-founder and CPO Laurent Gil. “You just need to create an account and connect your AWS, Google, or Azure Kubernetes apps.”
Gil adds that Security Insights can be used for multiple cloud environments or single clouds, and it provides the same security alerts and insights regardless of which cloud providers the organization is using, with a simple and general level of control.
There are native tools that handle these tasks, of course. Microsoft Offers Microsoft Defender for Containers, for example, which covers more but costs $7 per CPU per VM. It also requires customers to install a proxy on their resource.
Google Cloud runs a vulnerability assessment Services
Images are priced at $0.26 per scanned container image, while Kubernetes Security includes this service and a vulnerability assessment before the year.
“However, we already see that we are able to detect more best practice violations,” Gill stresses. “The value is in the platform – security insights and cloud optimization make your applications both secure and independent, with immediate on-site ROI.”
In short, Gill says users get a “robust and complete” insight into Kubernetes security monitoring as well as an immediate ROI where the cost of Cast AI is always a small part of the savings benefits.
“Apps now operate securely and independently, with instant rights and one of the fastest automatic metering devices on the planet,” he adds.
Kubernetes environments pose multiple challenges
Mike Barkin, chief technical engineer at Vulcan Cyber, a company that provides SaaS to address enterprise cyber risks, notes that Kubernetes (also known as k8s) environments It has many specific challenges.
“These include hacked images, visibility into the environment, creating and maintaining secure configurations, and a host of other issues with securing images in containers in the cloud,” he explains.
It adds anything that can help the security operations team to standardize their tools and give them more context and clarity.
“This is the case whether it’s in the form of a single focused tool that covers multiple aspects of a deployment, or a risk management tool that brings other tools together,” says Barkin.
As a deployment coordinator, Kubernetes will dominate enterprise alignment challenges, whether hybrid/multicloud or datacenter-based, says John Stephen, chief technology officer of automated threat modeling provider ThreatModeler.
“In fact, the goal of Kubernetes is to strip away the management of the underlying infrastructure, and replace it with its own blueprint,” he says. He shows that managed Kubernetes simplifies scaling because the CSP’s control over the underlying infrastructure makes it seem limitless.
And managed solutions make it easier and more secure to integrate key CSP-specific services, such as Directory Services, Persistence Solutions, or Learning APIs, into your Kubernetes application, he says.
“However, organizations can also feel that managed k8 devices are being constrained — they are tied to a specific provider through configuration, service, and management properties,” Stephen says.
“In practical terms, managed k8s replace the complexity of multicloud k8s for privacy and installation in a single cloud management,” he says. “Given the above, it is strategic to target k8s security solutions. Providing visibility into clusters meets a critical need.”
Stephen adds that more than one startup has experienced outages for several days because misconfiguration of k8s disrupted an important work function offline, or because claims for storage, memory, or allocation account set an extremely low cap on peak usage during heavy use.
“If companies start looking at k8s as an unreliable platform — even if they don’t have the experience to use it — they will move on to simpler solutions,” he says.