Kubernetes Security Report

In this report - which is based on our scans of over 200,000 cloud accounts - we dive into the state of Kubernetes security, providing statistics that shed light on the prevalence of threats in Kubernetes environments and uncovering risks that often go unnoticed. Our research team surveys the data to answer questions like:

  • How many clusters have passed their End of Support days?

  • How common are critical vulnerabilities in publicly-exposed containers?

  • What are the numbers for new Pod Security
    Standards adoption?

But we don't stop there. Rather than listing statistics in an ad-hoc fashion, we quantify the risks by attributing them to the stages of the full attack path - from initial access to impact. We also provide a series of statistics on security controls and mitigations. Overall, our analysis enables us to examine the weakest links in cloud environments and devise the best ways to defend against attacks. We dub this defense approach The Zone Defense (a basketball metaphor) and present our final recommendations in the executive summary.

Wizがお客様の個人データをどのように取り扱うかについては、当社の プライバシーポリシー.

1対1のデモに興味がありますか?

デモでは、Wiz ができる方法を学びます。

  1. 1. クラウド上の隠れた脆弱性を検出する
  2. 2. 状況に応じてリスクに優先順位を付ける
  3. 3. 重大な脅威に対する修復時間を短縮

ありがとうございます!
デモのリクエストを受け取りました

私たちのチームの1人がまもなく連絡を取り、Wizの個人的なデモを手配します。

世界で最も革新的な企業からの信頼

Morgan Stanley logo
ASOS logo
BMW logo
DocuSign logo
Slack logo
Fox logo
Colgate-Palmolive logo
Carrefour logo
Plaid logo
Priceline logo
LVMH logo
Aon logo
IHG logo
Hearst logo
Canva logo