Upgrade & Secure Your Future with DevOps, SRE, DevSecOps, MLOps!
We spend hours on Instagram and YouTube and waste money on coffee and fast food, but wonât spend 30 minutes a day learning skills to boost our careers.
Master in DevOps, SRE, DevSecOps & MLOps!
Learn from Guru Rajesh Kumar and double your salary in just one year.
Source:-digitaljournal.com
The co-founder of StackRox, Ali Golshan, CTO has provided Digital Journal with their predictions for 2020 dealing with things like the growth of Kubernetes and service mesh technology.
The technology expert Ali Golshan also considers the intersection of DevOps and security, among 2020âs key technology development themes. A key focus is with Kubernetes, which is a portable, extensible, open-source platform for managing containerized workloads and services.
Consolidates around Kubernetes
First, according to StackRoxâs Golshan, a key theme will be about âorchestration consolidates around Kubernetesâ. With this he notes: âA lot of companies have gone down the path of DevOps, building and using containers and microservices. As a result, workloads are getting more complex, and companies are getting a much better sense of the functionality they need from the container ecosystem.â
He adds that: âThe Kubernetes ecosystem is very rich, and as more companies find value in using Kubernetes as a container orchestrator, they will adopt more solutions in the ecosystem. These advances mean weâll see increasingly complex workloads running in Kubernetes.â
Unsecured Tesla Kubernetes console
Unsecured Tesla Kubernetes console
RedLock
Golshan also notes how: âWe’re seeing a pattern where different types of workloads are becoming possible because of Kubernetes. This proliferation is particularly true among companies building SaaS solutions – these applications are data heavy and very complex. These applications also lend themselves well to wider adoption of service mesh.â
Kubernetes maturity
Golshan âs second theme is that âKubernetes maturity means businesses can build bigger, better things.â With this he states: âThe results of Cloud Native Computing Foundationâs (CNCF) first full Kuberenetes audit revealed that Kurbentes is foundationally secure and fully functional. But it also forced Kubernetes users to take a closer look at potential vulnerabilities, configuration issues, and other weaknesses.â
He adds further: âUp to this point, a lot of organizations were running Kubernetes to build and test applications, or run in environments that didnât have external exposures. They didn’t have mission-critical applications with web-facing services exposed. The pattern towards the maturity of Kubernetes is similar to other technologies. Virtualization went through something very similar in the early 2000s. Public cloud went through it from roughly 2008-2012. Kubernetes is following a very natural progressionâ.
Rise of service mesh
Golshan âs third point is that âservice mesh comes into its ownâ. In relation to this, he finds: âWhile service mesh technology is in its early stages in comparison to Kubernetes, we’re starting to see new requirements for how tools such as Istio, Envoy, and Linkerd are going to be used. As customer deployments of service mesh technologies get more complex, the applications it supports will increase in complexity and criticality.â
Data is the new oil.
Data is the new oil.
Chiffre01 (CC BY-SA 4.0)
Golshan says: âThe general progression of microservices deployments is that you lock down your CI/CD, continuously conduct image scanning, and then harden your deployment process. Then you put the services into runtime and segment your network. You get more sophisticated as you move up the stack and incorporate additional controls and visibility into the application.â
In addition, Golshan âs analysis finds: âThat last piece is what service mesh provides, and from a productization and application perspective, the evolution of service meshes is still unclear, since – unlike with k8s – no clear winner has emerged. The needs for observability, tracing and application-level controls using policies and routing are clear – however we have yet to see which technology emerges as the dominant player.â
Making cloud native more functional
Golshanâs fourth point is how âadvanced third-party tooling makes cloud native more functional.â Here he surmises: âThe CNCF security audit of Kubernetes demonstrated a high degree of security. That success, however, doesnât necessarily mean that Kubernetes is operationalized in a way that it can run a massively scaled business. Getting to this state will require continued development of third-party tooling.â
Golshan adds: âThis challenge has many components. Kubernetes itself must scale. Then organizations need further maturity of tools that form part of the DevOps and CI/CD deployment ecosystem to deliver features including observability and security. While Kubernetes gives you the functionality to do some of these functions, it canât derive and share the intelligence an organization needs to take security or other operational actions. As the tools evolve to support this added functionality, technology stacks built around Kubernetes will become more feature rich, programmatic, programmable, and scalable.â
Golshan also finds that: âYou need third-party tools to ingest data, analyze it, and deliver actionable intelligence. In an ideal scenario, that intelligence will then programmatically update infrastructure for various use cases. For example, Kubernetes has a function called pod security policies, where you can write policies based on how you want pods in a container to run. But this functionality requires something to automate it – otherwise, you would have to do it manually a hundred times a day, tens of thousands of times a week, and countless times over a year. You need a tool to automatically produce these policies for you based on your application development, deployment, and runtime environment. This example is just one of the dozens where Kubernetes needs third-party tools to augment its native functionality.â
Importance of operational safety
Golshanâs fifth prediction is that âKubernetes use cases move towards operationalization safetyâ. He states here: âTo date, the most standard use cases for Kubernetes security across all organizations are visibility and configuration management. These use cases dominate when deployments are still early. As organizations scale and mature their deployments, the security use cases will evolve and grow as well.â
Golshan adds: âWhatâs interesting is how organizations of a certain profile are more advanced in their deployments. In some industries, such as healthcare, startups tend to be more advanced than established businesses.â
He also finds: âCompanies that are in transition are also likely to adopt Kubernetes more aggressively. Organizations such as Sony and Disney are rebuilding streaming services using Kubernetes, because they want to move as fast and offer services as quickly as companies such as Netflix. So sometimes Kubernetes adoption is tied to getting a leg up on innovation, and other times itâs a matter of survival.â
Image of data (based on the letter sequence of DNA) from the Barbican Centre London.
Image of data (based on the letter sequence of DNA), from the Barbican Centre, London.
Tim Sandle
âWhile the initial adoption of Kuberentes has to do largely with enabling business innovation, the technology offers powerful opportunities to build security directly into the development process. Developers are realizing that if security isnât built in, they will suffer from undetected vulnerabilities, misconfigurations, or other factors out of their control. Security is increasingly part of the developerâs consciousness – itâs becoming an integral part of running services and applications safely for optimal business value.â
Security as code
Golshanâs sixth point is that âsecurity as code translates security to safetyâ. In terms of what this means: âThe concepts of security and safety are often conflated. But the difference is the same as the difference between walls and doors. Treating both infrastructure and security as code allows security to move from being probabilistic to deterministic; DevSecOps teams can use the declarative nature of Kubernetes and microservices to automate processes that can scale.â
And with what businesses need to do: âThe fact is, you have to build security into development for automation because you’re dealing with so much data, so many users, highly distributed infrastructure, and much larger scale. You canât just keep adding firewalls and agents and point solutions in the way security teams are used to. To transition security into safety, you have to bake it in to the entire process.â
Primacy of operational issues
Golshanâs seventh and final point relates to the importance of placing âoperational issues over security issues.â By this he means: âThis past year has seen a number of Kubernetes CVEs emerge, but the community response has been strong and effective. We should expect to see more operational issues with Kuberenetes than security issues in the coming years. Addressing questions such as âhow can I deploy Kubernetes to thousands of clusters and tens of thousands of nodes?â will be driving changes in Kubernetes more than responding to security vulnerabilities or breaches.â
He goes on to state: âAs these operational challenges get addressed, weâll see an acceleration in improvements that results in increased scalability, performance, and functionality. As a result, Kubernetes will be adopted by a much larger arena of applications, including IoT, autonomous vehicles, and popular consumer technologies that need processing power and the ability to build and deliver applications and services more effectively. These technologies will really shine a light on the breadth and scale that Kubernetes-based applications can enable.â