Portshift has launched its new K8SHIELD Framework, a Portshift-developed knowledge base of curated information modeled after the MITRE ATT&CK Framework. The company has also introduced context aware security policy enablement to support DevOps and security professionals.
The K8SHIELD Framework is designed specifically for the Kubernetes ecosystem, allowing for the identification of attack patterns within Kubernetes clusters, following the attack methods defined by the MITRE ATT&CK Framework. K8SHIELD then analyzes those patterns to provide remediation suggestions and detailed reports.
According to Portshift, the K8SHIELD Framework provides a window to better understand the current security vulnerabilities of the Kubernetes implementation. With this framework, DevOps and security professionals now have access to a globally-accessible knowledge base for threat modeling for more resilient container operating environments and overall security context required for an efficient security posture.
In addition, the new risk analysis tool can predict the threat potential of Kubernetes objects based on a variety of parameters.
K8SHIELD is said to provide information on security misconfigurations and overly permissive permissions to resources as well as on their exposure to malicious access.
The new feature detects cloud credentials, security tokens and other actions that allow access – a unique and more proactive capability that furthers the shift of security to the left.