Executive summary
Our latest edition of the State of Kubernetes security report analyzes emerging trends in container,
Kubernetes, and cloud-native security.
The report highlights the security challenges in cloud-native development—and how organizations are addressing the challenges and protecting their applications. Based on survey results from more than 300 DevOps, engineering, and security professionals, this report uncovers new findings about how companies that embrace containers and Kubernetes implement DevSecOps initiatives to protect their cloud-native environments.
Security is one of the biggest concerns with container adoption, and security issues continue to cause delays in deploying applications into production. We also look at the most common types of security incidents that companies experience in their Kubernetes environments, as well as whether they report any customer or revenue loss due to these incidents.
DevSecOps is quickly becoming a standard for shifting security left and addressing security issues within the DevOps workflows, with over 3/4 of respondents having initiatives that increase collaboration between DevOps and Security teams. The survey results highlight the importance of collaboration across Dev, Ops, and Security teams to implement security early in the development life cycle to realize the greatest benefit of Kubernetes—innovating fast.
We encourage you to benchmark yourself against the findings in this report to determine how you can accelerate your efforts to apply security controls across containers and Kubernetes.
Delaying security could mean delaying innovation or facing financial loss. There are many security advantages you can use in containers and Kubernetes—from declarative configuration and immutable infrastructure to the isolation inherent in containerized applications.
Organizations, however, need the knowledge, tooling, and processes to put those capabilities to work so they can benefit from the sizable advantages of running fast in a DevOps-driven, cloud-native world.