Are we reasoning about cloud application vulnerabilities in the right way?

Stefano Simonetto, Peter Bosch

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

57 Downloads (Pure)

Abstract

Abstract: Enterprises are quickly transitioning to container orchestrators, like Kubernetes, which helps developers and engineers manage a large number of container images, pods, and nodes. However, this new approach does not solve the problem of software vulnerabilities but arguably it makes vulnerability management harder. Most of the time, companies have to deal with thousands of containers in a dynamic environment since they can fail, and be rescheduled in other nodes. All these factors have a great impact on the vulnerability management system because the vulnerabilities and misconfigurations in the system are too many to be manually operated, so we seek a tool to highlight the most dangerous (we need a clear definition of dangerous) to prioritize them. This paper wants to emphasize the need for a vulnerability prioritization method and a defense technique improvement.
Original languageEnglish
Title of host publicationEuropean Symposium on Security and Privacy (Euro S&P)
DOIs
Publication statusPublished - 3 Jul 2023
Event8th IEEE European Symposium on Security and Privacy - TU Delft Echo, Delft, Netherlands
Duration: 3 Jul 20237 Jul 2023
Conference number: 8
https://eurosp2023.ieee-security.org/index.html

Conference

Conference8th IEEE European Symposium on Security and Privacy
Abbreviated titleEuro S&P
Country/TerritoryNetherlands
CityDelft
Period3/07/237/07/23
Internet address

Fingerprint

Dive into the research topics of 'Are we reasoning about cloud application vulnerabilities in the right way?'. Together they form a unique fingerprint.

Cite this