The State of Kubernetes Open Source Security
The State of Kubernetes Open Source Security
Introduction and Key Findings............ 3 Level of Confidence in the Organization's K8S Security
Expertise .................................................................................... 17
Survey Report Findings................... 7 Is K8S an Independent Practice or a Subset of Broader
K8S Security – Usage of Open Source vs. Commercial.....8 Cloud Security? ........................................................................ 18
Open Source vs. Commercial - Preferences for K8S The Biggest Challenges Faced with K8S Security.............19
Security Solutions ..................................................................... 9 Scanning Frequency for K8S Vulnerabilities and
Number of Open Source K8S Security Tools in Use........ 10 Misconfigurations ................................................................... 20
Open Source is Used Widely for K8S Security .................. 11 Time to Fix Misconfigurations and Vulnerabilities.......... 21
Biggest Challenges Using Proprietary K8S Security Knowledge for Handling K8S Security – Developers vs.
Solutions .................................................................................... 12 Security Teams ........................................................................ 22
Top Challenges Using Open Source for K8S Security Top K8S Security Concerns ................................................... 23
Solutions .................................................................................... 13 Roles of K8S Security Tools in Regulation Compliance
Complexity of Integrating K8S Security Solutions into Requirements .......................................................................... 24
Existing Stack ............................................................................ 14
Demographics ............................25
Who Owns vs. Who Should Own K8S Security? ................ 15
Ownership of K8S Security in the Organization by Titles About ARMO ..............................27
...................................................................................................... 16
2
The State of Kubernetes Open Source Security
Introduction and
Key Findings
3
The State of Kubernetes Open Source Security
Introduction & Methodology
Open source software — where the original source code is made available for public use and can be modified and
redistributed at will — is becoming increasingly popular across many different areas of business. Developers are reaping
the benefits of transparency and visibility into the code that they use, and the ability to contribute and be part of the
code’s evolution, too.
Kubernetes, also known as K8s, is an open-source system for automating the deployment, scaling and management of
containerized applications. It is now ubiquitous for cloud-native environments, becoming a de facto standard for
organizations who work on the cloud. According to CNCF research, 96% of organizations are either using or evaluating
Kubernetes, more than at any other time since they began collecting data in 2016. As an increasing number of organizations
move to Kubernetes, this also means that more and more attackers are making it their target.
With this survey, our goal is to understand how these two trends, increased open-source adoption in general and increased
use of Kubernetes in specific, work in tandem. How are companies using open source tools to secure their Kubernetes
environments?
Today’s DevOps teams are forced to make a difficult choice between two realities. They can attempt to integrate several
fragmented open-source tools together, which adds complexity to the monitoring and management of the Kubernetes
environment, and requires a significant effort in order to get a single view. Alternatively, they can commit to a proprietary
solution that they can’t adapt, and where they can’t access the code, influence the roadmap or contribute to its future. We
asked respondents how they manage the relationship between these two approaches, and what challenges are they facing
as a result.
Methodology
To get a deeper understanding of the relationship between open source and K8S security, we commissioned a survey of 200
Kubernetes users in companies that ranged in size from under 100 employees to more than 5,000. The survey was
completed by Global Surveyz, an independent survey company, and took place during July and August 2022.
The survey respondents are software developers and stakeholders from cybersecurity teams, DevOps and DevSecOps, 57%
from North America, 29% in Europe, and 14% in APAC. The respondents were recruited through a global B2B research panel,
and invited via email to complete the survey. The average amount of time spent on the survey was 6 minutes and 49
seconds. The answers to the majority of the non-numerical questions were randomized, in order to prevent order bias in
the answers.
4
The State of Kubernetes Open Source Security
Key Findings
1 Over half of companies are using open source for Kubernetes security
55% of respondents are using open source for K8S security, either as a standalone solution or in a hybrid set up
alongside a proprietary solution. Open source is used widely across all areas of security, especially for service meshes
where thanks to CNCF-led projects, more oversight and support is available.
5
The State of Kubernetes Open Source Security
4 DevSecOps owns K8S security. But who are they, really?
The majority of respondents agree that K8S security belongs with DevSecOps, but this raises another question – where
does DevSecOps live within the org? When we break down responses by role, the majority of Security teams believe
they should hold responsibility, while DevOps believe DevSecOps is their own domain. As K8S security matures, the
market will need to gain greater clarity around ownership.
6
The State of Kubernetes Open Source Security
Survey Report
Findings
7
The State of Kubernetes Open Source Security
K8S Security – Usage of Open Source vs. Commercial
Over half (55%) of companies are using open Using Open Source
source for their Kubernetes security, either 55%
alone or to complement their proprietary Only Open
solution. When looking at regional Both Open Source
breakdowns, Europe is adopting open source Source and 21%
Commercial
as a standalone solution in greater numbers 34%
than APAC and North America.
It's clear that companies are attempting to
have it all, recognizing that they may need
commercial solutions for the benefits they All Responses
offer, but they don’t want to lose the visibility,
transparency and influence they gain by
utilizing open source technology.
Using
As there is no complete end to end open Commercial Only
80% Commercial
source Kubernetes security solution available, 46%
companies are forced to turn to proprietary
solutions for official support, to fill the gaps,
and to ensure ease of adoption.
15% 12%
24%
32%
39% 40%
North Europe APAC
America
46% 48%
44%
8
The State of Kubernetes Open Source Security
Open Source vs. Commercial - Preferences for K8S Security Solutions
9
The State of Kubernetes Open Source Security
Number of Open Source K8S Security Tools in Use
24%
17%
1 2-4 5-8
10
The State of Kubernetes Open Source Security
Open Source is Used Widely for K8S Security
We asked respondents in which areas they are using their Kubernetes security solutions. In all areas, open source is
used, either exclusively or in combination with commercial solutions.
The top areas where open source is used are service mesh (32%), network policy/microsegmentation (24%), and
misconfiguration scanning (24%). One possible explanation is that several service mesh solutions are CNCF-led
graduated projects (such as LINKERD), allowing users to access greater oversight and more support, which may explain
their wider adoption rates.
As for proprietary/commercial solutions only, the top areas where this approach is used are vulnerability scanning
(51%), secrets protection (51%), and runtime security (51%).
11
The State of Kubernetes Open Source Security
Biggest Challenges Using Proprietary K8S Security Solutions
12
The State of Kubernetes Open Source Security
Top Challenges Using Open Source for K8S Security Solutions
13
The State of Kubernetes Open Source Security
Complexity of Integrating K8S Security Solutions into Existing
Stack
Difficult to very
difficult Difficult
69% 52%
14
The State of Kubernetes Open Source Security
Who Owns vs. Who Should Own K8S Security?
15
The State of Kubernetes Open Source Security
Ownership of K8S Security in the Organization by Titles
2%
3%
6% 7% 6% 5% 8%
26% 15%
16
The State of Kubernetes Open Source Security
Level of Confidence in the Organization's K8S Security Expertise
Kubernetes-based security, as it is a
relatively new and diverse practice where
expertise is hard to come by.
Very confident
69%
Very to
extremely confident
78%
17
The State of Kubernetes Open Source Security
Is K8S an Independent Practice or a Subset of Broader Cloud
Security?
Subset of
broader cloud
security
97%
18
The State of Kubernetes Open Source Security
The Biggest Challenges Faced with K8S Security
Lack of resources 7%
No bandwidth 5%
We have no challenges 1%
19
The State of Kubernetes Open Source Security
Scanning Frequency for K8S Vulnerabilities and Misconfigurations
10-19% of those “in the trenches” agree. Figure 13: Scanning Frequency for K8S Vulnerabilities and Misconfiguration
38%
19%
16% 14%
10%
20
The State of Kubernetes Open Source Security
Time to Fix Misconfigurations and Vulnerabilities
51%
45%
2% 1% 1%
21
The State of Kubernetes Open Source Security
Knowledge for Handling K8S Security – Developers vs. Security Teams
22
The State of Kubernetes Open Source Security
Top K8S Security Concerns
23
The State of Kubernetes Open Source Security
Roles of K8S Security Tools in Regulation Compliance Requirements
24
The State of Kubernetes Open Source Security
Demographics
25
The State of Kubernetes Open Source Security
Country, Department, Role, Seniority & Company Size
R&D/Engineering Software
1% Developer
7%
APAC
14%
IT Cyber
24% security
DevOps DevSecOps
40% 23% 36%
North
Europe America
29% 57%
Cyber
security DevOps
36% 35%
34%
33%
30%
25%
15%
13% 12% 13%
6% 6% 6%
4% 5%
1%
Manager Director Team Specialist Analyst VP/Head SME C-suite < 100 100-199 200-249 250-999 1,000-4,999 5,000+
Member people people people people people people
ARMO, the creators of Kubescape, is building the first end-to-end open-source Kubernetes Security platform, made for
DevOps.
Our patented technology and open-source solutions fit natively within the CI/CD pipeline and existing development
tools, assuring DevOps, DevSecOps, and developers that every Kubernetes’s cluster, container, and microservice is
born and remains secure, from development to production and from configuration to run-time, every time.
Kubescape scans Kubernetes clusters, Manifest files (e.g. YAML, HELM), Code repositories, Container image registries,
worker nodes and API servers, detecting misconfigurations according to multiple frameworks (such as the NSA-CISA,
MITRE ATT&CK and more), and isolating software vulnerabilities and RBAC (role-based-access-control) violations at early
stages of the CI/CD pipeline. It also calculates risk score instantly and shows risk trends over time.
• Join the discussion on Discord - https://discord.gg/DWv4gPgCzU
• Get involved on Kubescape GitHub page - https://github.com/kubescape/kubescape
• Follow us on Twitter - https://twitter.com/armosec
• Sign up for Kubescape cloud (free forever for up to 10 worker nodes) -
https://cloud.armosec.io/account/sign-up
27
The State of Kubernetes Open Source Security