{"id":75772,"date":"2024-02-14T11:00:54","date_gmt":"2024-02-14T11:00:54","guid":{"rendered":"https:\/\/entertainment.runfyers.com\/index.php\/2024\/02\/14\/ktrust-launches-an-automated-red-team-for-kubernetes-security-techcrunch\/"},"modified":"2024-02-14T11:00:54","modified_gmt":"2024-02-14T11:00:54","slug":"ktrust-launches-an-automated-red-team-for-kubernetes-security-techcrunch","status":"publish","type":"post","link":"https:\/\/entertainment.runfyers.com\/index.php\/2024\/02\/14\/ktrust-launches-an-automated-red-team-for-kubernetes-security-techcrunch\/","title":{"rendered":"KTrust launches an automated red team for Kubernetes security | TechCrunch"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p id=\"speakable-summary\"><a href=\"https:\/\/www.ktrust.io\/\" target=\"_blank\" rel=\"noopener\">KTrust<\/a>, a Tel Aviv-based security startup, is taking a different approach to Kubernetes security from many of its competitors in the space. Instead of only scanning Kubernetes clusters and their configurations for known vulnerabilities, KTrust is taking a more proactive approach. It deploys an automated system that tries to hack into the system. This allows security teams to focus on real-world attack paths and not just long lists of potential security vulnerabilities. As such, KTrust is essentially a read team in a box \u2014 though research firm Gartner prefers to call it Continous Threat Exposure Management (CTEM).<\/p>\n<p>Ktrust is coming out of stealth today and announcing a $5.4 million seed funding round led by AWZ Ventures.<\/p>\n<p>As with so many Israeli security companies, the leadership team is coming in with considerable experience. CEO Nadav Toledo was previously a colonel in the Israeli Defense Forces\u2019 8200 intelligence unit, where he spent 25 years before starting KTrust. CTO <a href=\"https:\/\/www.linkedin.com\/in\/nadav-aharon-nov\/?originalSubdomain=il\" target=\"_blank\" rel=\"noopener\">Nadav Aharon-Nov<\/a> previously was the CTO at cyber intelligence and defense company R-MOR, while COO Sigalit Shavit was previously the global CIO of publicly traded CyberArk. CBO Snit Mazilik complements this group with extensive business experience, including as the CEO of Shanghai-based fashion wholesaler Must Garment Group and as a managing partner at real estate investment firm NOI Ventures. That\u2019s an eclectic group of founders, but as Toledo told me, \u201ceverybody brings a different perspective to the board and it\u2019s the very best team.\u201d<\/p>\n<p>As a group, Toledo, Aharon-Nov and Mazilik started brainstorming different ideas for a security startup. The team landed on Kubernetes, which is not necessarily a surprise, given that it\u2019s still a fast-growing ecosystem that many traditional enterprises are only now starting to embrace.<\/p>\n<div id=\"attachment_2664991\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/Attack-Flow_2-1.png\" target=\"_blank\" rel=\"noopener\"><\/a><\/p>\n<p id=\"caption-attachment-2664991\" class=\"wp-caption-text\"><strong>Image Credits:<\/strong> KTrust<\/p>\n<\/div>\n<p>\u201cKubernetes is very complex and it\u2019s very dynamic. We went to organizations and talked to the DevOps teams and CISOs [\u2026] We saw the DevOps teams were struggling \u2014 and we also saw the DevSecOps teams struggling because they want them to also be Kubernetes experts \u2014 configuring Kubernetes \u2014 and on the other hand, be security experts,\u201d Toledo told me.<\/p>\n<p>The team noted that most Kubernetes security solutions took what he called a \u201cpassive scanner approach\u201d that focuses on doing static code analysis. But that results in lots of alerts and somebody then has to turn these into a work plan. The idea behind KTrust is to take a very different approach by using an automated red team algorithm that proactively explores attack paths to identify exposures in a Kubernetes-based system. KTrust takes a customer\u2019s Kubernetes infrastructure settings and then duplicates them in a secure sandbox where its algorithms can attack it.<\/p>\n<div id=\"attachment_2664992\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/Infrastructure-Map_2-1.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-2664992\" class=\"size-full wp-image-2664992\" src=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/Infrastructure-Map_2-1.png\" alt=\"\" width=\"1024\" height=\"784\" srcset=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/Infrastructure-Map_2-1.png 3280w, https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/Infrastructure-Map_2-1.png?resize=150,115 150w, https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/Infrastructure-Map_2-1.png?resize=300,230 300w, https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/Infrastructure-Map_2-1.png?resize=768,588 768w, https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/Infrastructure-Map_2-1.png?resize=680,521 680w, https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/Infrastructure-Map_2-1.png?resize=1536,1176 1536w, https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/Infrastructure-Map_2-1.png?resize=2048,1568 2048w, https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/Infrastructure-Map_2-1.png?resize=1200,919 1200w, https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/Infrastructure-Map_2-1.png?resize=50,38 50w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"\/><\/a><\/p>\n<p id=\"caption-attachment-2664992\" class=\"wp-caption-text\"><strong>Image Credits:<\/strong> KTrust<\/p>\n<\/div>\n<p>The algorithm then mimics real attackers. \u201cBy doing this, we find actual attack paths to exploit and you don\u2019t get a list of hundreds of items that are not connected. We show the DevSecOps the validated exploits \u2014 and it\u2019s true validation because it was a real attack,\u201d Toledo explained. He noted that when working with a recent client, the passive scanner discovered more than 500 vulnerabilities, but using KTrust\u2019s agent-based system, the team was able to whittle this down to only about a dozen actual attack paths.<\/p>\n<p>Using KTrust, security teams can then see exactly how the algorithm attacked the system. As for mitigation, the service can provide users with recommendations for manual mitigation and in many cases, it can also automate these steps.<\/p>\n<p>It\u2019s worth noting that the company employs a group of security specialists dedicated to uncovering novel attack vectors. The team has already submitted a number of CVEs (Common Vulnerabilities and Exposures) for Kubernetes and Argo CD.<\/p>\n<p>\u201cOur investment in KTrust signifies our confidence in their distinctive Kubernetes security solution, meeting a critical market demand. With this investment KTrust will scale to empower DevSecOps globally in ensuring the secure deployment of their Kubernetes-based applications,\u201d said\u00a0 Yaron Ashkenazi, Managing Partner, AWZ Ventures.<\/p>\n<p>\u00a0<\/p>\n<\/p><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/techcrunch.com\/2024\/02\/14\/ktrust-launches-an-automated-red-team-for-kubernetes-security\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>KTrust, a Tel Aviv-based security startup, is taking a different approach to Kubernetes security from many of its competitors in the space. Instead of only scanning Kubernetes clusters and their configurations for known vulnerabilities, KTrust is taking a more proactive approach. It deploys an automated system that tries to hack into the system. This allows [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":75773,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":{"0":"post-75772","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"_links":{"self":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/75772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=75772"}],"version-history":[{"count":0,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/75772\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/75773"}],"wp:attachment":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=75772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=75772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=75772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}