Tenable Delivers Zero Trust Cloud Functionality for Kubernetes

Tenable®, the Exposure Management company, today announced expanded Tenable Cloud Security cloud-native application protection platform (CNAPP) capabilities for Kubernetes on-premises and public cloud environments. These latest advancements extend Tenable’s CNAPP benefits, such as contextual risk visibility, preventive security controls, and zero trust / least privilege enforcement, to Kubernetes.

Kubernetes, the de facto standard used by global organisations for cloud application development and container orchestration, is complex and difficult to properly configure and manage. This can lead to increased security risk and cloud exposures. In fact, nearly four in 10 (37%) organisations have experienced revenue or customer loss as the result of a Kubernetes security incident.1 Tenable Cloud Security eliminates the barrier to entry for developers, security professionals and security leaders alike by dramatically simplifying technical risk data into plain, easy to understand language.

Tenable Cloud Security is intuitive and highly scalable, helping organisations easily navigate any step on their cloud security journey. Customers gain the ability to prioritise their efforts with automated contextual risk analysis across the full cloud technology stack, as well as achieve least privilege at scale. The new Kubernetes features and functionality from Tenable Cloud Security enable organisations to:

  • Scale Visibility Across Public and On-Premises Kubernetes Deployments: Protect Kubernetes clusters running on-premises, in private networks, as well as both managed and self-managed clusters with comprehensive visibility and reporting at scale. Unlock full visibility to the resources in a cluster, including workloads, users, role bindings, namespaces and beyond.

  • Intercept Risky Deployments with Preventive Security Controls: Block non-compliant Kubernetes resource deployments with custom admission controller and custom zero trust security policies.

  • Evade Long-Standing Privileges: Leverage least privilege policies and Just-in-Time (JIT) access to provide time-limited access and avoid long-standing privileges in Kubernetes clusters.

“Tenable Cloud Security takes the guesswork out of the entire cloud security equation, enabling security teams to reduce cloud risk in minutes,” said Shai Morag, senior vice president and general manager of Tenable Cloud Security. “We’re in an overly saturated market of feature-based tools that address small, inconsequential areas of risk. Tenable provides comprehensive visibility, accelerated time to value and unmatched actionable intelligence that takes the security headaches out of Kubernetes and all cloud infrastructure.”

Earlier this year, CRN named Tenable a Cloud 100 company, a list that honors the 100 leading cloud companies for 2024 across five key categories: infrastructure, monitoring and management, storage, software and security.

Read more about Kubernetes security in the following blog post: Unlocking Kubernetes Security with Tenable Cloud Security’s Latest Features.

Join the upcoming Tenable webinar titled, “Kubernetes Confessions: Tune In and Get the Help You Need to Finally Put an End to Those Risky K8s Security Sins” on March 27, 2024 at 11 am ET, by registering here.

More information about Tenable Cloud Security is available at: https://www.tenable.com/products/tenable-cloud-security.

1 A Red Hat study, 2023, based on a global survey of 600 DevOps, engineering, and security professionals.

About Tenable

Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more at tenable.com.

Leave a Reply

Your email address will not be published. Required fields are marked *