{"id":2673,"date":"2019-06-26T11:53:09","date_gmt":"2019-06-26T19:53:09","guid":{"rendered":"https:\/\/zed.inguardians.com\/?page_id=2673"},"modified":"2022-10-13T14:12:43","modified_gmt":"2022-10-13T21:12:43","slug":"cloudsecurity","status":"publish","type":"page","link":"https:\/\/zed.inguardians.com\/cloudsecurity\/","title":{"rendered":"Cloud Security"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.16″ background_image=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2019\/03\/network-2402637.jpg” z_index_tablet=”500″ box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2019\/08\/APT.png” align=”center” _builder_version=”4.16″ width=”40%” module_alignment=”left” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”|700|||||||” text_text_color=”#ffffff” text_font_size=”20px” header_font=”||||||||” header_text_color=”#ffffff” header_font_size=”56px” header_font_size_tablet=”” header_font_size_phone=”41px” header_font_size_last_edited=”on|desktop” global_colors_info=”{}”]<\/p>\n

Cloud and Container Security<\/h1>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ inner_shadow=”on” custom_padding_last_edited=”on|desktop” admin_label=”section” _builder_version=”4.16″ background_color=”#444444″ background_color_gradient_direction=”181deg” background_image=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2019\/02\/golf_course_44.png” parallax=”on” custom_padding_tablet=”50px|0|50px|0″ custom_padding_phone=”” padding_mobile=”off” global_colors_info=”{}”][et_pb_row padding_mobile=”off” column_padding_mobile=”on” admin_label=”row” module_id=”in-team-info” _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”Cloud Security Description” _builder_version=”4.18.0″ text_font=”Arial||||||||” text_text_color=”#ffffff” text_font_size=”17px” background_size=”initial” background_position=”top_left” background_repeat=”repeat” background_layout=”dark” hover_enabled=”0″ text_font_size_last_edited=”off|” z_index_tablet=”500″ text_text_shadow_horizontal_length_tablet=”0px” text_text_shadow_vertical_length_tablet=”0px” text_text_shadow_blur_strength_tablet=”1px” link_text_shadow_horizontal_length_tablet=”0px” link_text_shadow_vertical_length_tablet=”0px” link_text_shadow_blur_strength_tablet=”1px” ul_text_shadow_horizontal_length_tablet=”0px” ul_text_shadow_vertical_length_tablet=”0px” ul_text_shadow_blur_strength_tablet=”1px” ol_text_shadow_horizontal_length_tablet=”0px” ol_text_shadow_vertical_length_tablet=”0px” ol_text_shadow_blur_strength_tablet=”1px” quote_text_shadow_horizontal_length_tablet=”0px” quote_text_shadow_vertical_length_tablet=”0px” quote_text_shadow_blur_strength_tablet=”1px” header_text_shadow_horizontal_length_tablet=”0px” header_text_shadow_vertical_length_tablet=”0px” header_text_shadow_blur_strength_tablet=”1px” header_2_text_shadow_horizontal_length_tablet=”0px” header_2_text_shadow_vertical_length_tablet=”0px” header_2_text_shadow_blur_strength_tablet=”1px” header_3_text_shadow_horizontal_length_tablet=”0px” header_3_text_shadow_vertical_length_tablet=”0px” header_3_text_shadow_blur_strength_tablet=”1px” header_4_text_shadow_horizontal_length_tablet=”0px” header_4_text_shadow_vertical_length_tablet=”0px” header_4_text_shadow_blur_strength_tablet=”1px” header_5_text_shadow_horizontal_length_tablet=”0px” header_5_text_shadow_vertical_length_tablet=”0px” header_5_text_shadow_blur_strength_tablet=”1px” header_6_text_shadow_horizontal_length_tablet=”0px” header_6_text_shadow_vertical_length_tablet=”0px” header_6_text_shadow_blur_strength_tablet=”1px” box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” global_colors_info=”{}” sticky_enabled=”0″]<\/p>\n

InGuardians leads the information security offensive services community in cloud, container, and Kubernetes security. The InGuardians team regularly speaks and teaches Kubernetes and container security at top industry conferences, including RSA, Black Hat, Microsoft\u2019s BlueHat, DEF CON, and the Cloud Native Computing Foundation events, including KubeCon. InGuardians teaches sold-out Black Hat classes on Kubernetes and container security. The InGuardians team has also developed open-source tools for Kubernetes, including <\/span>Peirates<\/span><\/a>, a Kubernetes penetration testing tool, and <\/span>Bustakube<\/span><\/a>, a capture-the-flag (CTF) Kubernetes cluster. InGuardians staff members also founded and manage the annual DEF CON Kubernetes Capture the Flag competition.<\/span><\/p>\n

 <\/p>\n

The services below are a subset of what InGuardians can do for your organization.<\/strong> <\/em><\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ inner_shadow=”on” custom_padding_last_edited=”on|desktop” admin_label=”section” _builder_version=”4.16″ custom_padding=”54px|0px|52px|0px” custom_padding_tablet=”50px|0|50px|0″ custom_padding_phone=”” padding_mobile=”off” global_colors_info=”{}”][et_pb_row module_id=”securityarchitecture” _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_accordion _builder_version=”4.18.0″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” hover_enabled=”0″ border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” border_color_all=”#0c71c3″ box_shadow_style=”preset1″ global_colors_info=”{}” sticky_enabled=”0″][et_pb_accordion_item title=”Kubernetes Penetration Testing” open=”on” _builder_version=”4.18.0″ hover_enabled=”0″ border_color_all=”#848484″ global_colors_info=”{}” sticky_enabled=”0″]<\/p>\n

InGuardians has performed many Kubernetes penetration tests, attacking on-premises, public cloud-based, and hybrid clusters. The team\u2019s experience spans multiple Kubernetes distributions, including upstream Kubernetes, OpenShift, and Rancher\u2019s K3S, as well as managed Kubernetes environments, like Google Cloud\u2019s GKE, Amazon\u2019s EKS, and Microsoft Azure\u2019s AKS.\u00a0<\/span><\/p>\n

InGuardians also teaches Kubernetes attack techniques and has developed private and open-source tools for Kubernetes penetration testing, including the <\/span>Peirates<\/span><\/a> penetration testing tool.<\/span><\/p>\n

[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion _builder_version=”4.18.0″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” hover_enabled=”0″ border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” border_color_all=”#0c71c3″ box_shadow_style=”preset1″ global_colors_info=”{}” sticky_enabled=”0″][et_pb_accordion_item title=”Serverless Penetration Testing ” open=”on” _builder_version=”4.18.0″ hover_enabled=”0″ border_color_all=”#848484″ global_colors_info=”{}” sticky_enabled=”0″]<\/p>\n

InGuardians has tested many cloud environments, including applications that began their life in cloud-native environments, as \u201cserverless\u201d or \u201cfunction as a service\u201d deployments. The team\u2019s experience with cloud APIs spans and exceeds the three major domestic cloud providers, Amazon\u2019s AWS, Microsoft\u2019s Azure, and Google Cloud. It\u2019s not uncommon for our customers to contract InGuardians to advise on and test their migrations from the data center to the cloud. These can include everything from lift-and-shift deployments to rip-and-replace cloud-native deployments.<\/span><\/p>\n

[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion _builder_version=”4.18.0″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” hover_enabled=”0″ border_color_all=”#0c71c3″ global_colors_info=”{}” sticky_enabled=”0″][et_pb_accordion_item title=”Cloud Security Architecture and Product Review Services” open=”on” _builder_version=”4.18.0″ hover_enabled=”0″ border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” border_color_all=”#848484″ box_shadow_style=”preset1″ global_colors_info=”{}” sticky_enabled=”0″]<\/p>\n

Cloud-Native applications don\u2019t simply replace on-premises virtual machines with cloud provider virtual machine instances. Cloud-Native architectures redefine how your organization develops, scales, and maintains services.\u00a0<\/span><\/p>\n

Whether companies design their applications for a major cloud provider, an on-premises API-driven infrastructure, or use a hybrid approach, orchestration widens their attack surface. With that in mind, InGuardians offers state-of-the-art Security Architecture Review and Product Review services. Our clients hire us to assess and advise on the most important aspects of cloud security development and deployment, focusing on foundational services such as:<\/span><\/p>\n