Kubernetes: Do You Need To Install an Antivirus?

in DevOps , Kubernetes

10.png

The necessity of antivirus or anti-malware in Kubernetes environments is a long-standing debate. This article explains the reason behind some of the opinions on this and leaves you with information to help decide whether you need it in your Kubernetes environment or not.


    For computers, tablets, and smartphones, whether or not you need an antivirus or anti-malware is a topic that is widely debated for a long time. Even though they may not necessarily be effective in targeting and detecting all viruses and malware, it still serves as a security layer that can detect some if not most. It can stop viruses and malware from spreading into the system; it can provide real-time protection from viruses and scan and repair infected computers.

    However, it may have adverse effects on the performance of the system. In addition, several data leaks and privacy invasions occur from the use of antiviruses, and it also opens a potential avenue for threat actors to penetrate your system. These are some of the many reasons some are discouraged to use it.

    Many people also get it wrong by relying on just antivirus or anti-malware to protect their computers against all kinds of attacks. However, an antivirus is supposed to be just one component of your overall security strategy because security is complex. It requires multiple conscious and continuous efforts, like being mindful of your files, programs, and other inward data or hardware to be truly secure.

    Since the use of virtual systems and environments like containers and Kubernetes, it only makes sense to think of antivirus. Moreover, security in Kubernetes is even more complex. It is a severe issue that big tech companies such as Tesla get tested on. A recent attack was carried out on Tela's Kubernetes environment for malicious cryptocurrency mining and several others that affected thousands of Kubernetes clusters. Every organization is trying out all they can to stay out of compromise and protect their Kubernetes environment against viruses and malware attacks.

    So, do you need antivirus or anti-malware in your Kubernetes environment to achieve this security?

    There might not be a direct or definite answer because, like in computers running Linux and Unix-like systems, many people may agree that anti-malware is needed while many think it is obsolete.

    Antivirus may be advantageous in a Kubernetes environment, especially those running on Windows OS. Compared to other operating systems like macOS and all Linux distributions, Windows operating systems are generally more vulnerable to viruses and malware attacks. An example is the Siloscape malware discovered by Palo Alto's Unit 23 earlier in 2021. The malware is specifically built to target Kubernetes environments running on Windows OS by exploiting its security deficits to create backdoors for the threat actors to execute their malicious activities. This level of vulnerability is not the same for Kubernetes environments running on Linux or macOS because of the security measures they provide by default.

    Anti-malware or antivirus in a Kubernetes environment may help avert potential attacks identifying, reporting, and isolating malicious files in the Kubernetes environment. However, it also has some unpropitious effects on the Kubernetes environment. Aside from that, installing antivirus in cloud environments will take up memory and computing capacity, incurring costs that might not be worth it. Installing antivirus in the Kubernetes environment is not straightforward, so cloud platforms like Google Cloud (Kubernetes CalmAV) and RedHat provide tutorials on implementing it.

    To supplement the need to use an antivirus system, Google Cloud, for example, provides a container-optimized OS that is hardened with efficient security measures for hosting Docker containers. It locks the Kubernetes file system such that critical system files are safe from attacks by threat actors.

    Auditing your Kubernetes environment with audit and static analysis tools and runtime security tools such as Sysdig Falco, applying container security best practices, and implementing the Kubernetes RBAC policies correctly should also be enough to protect your clusters without the need for installing an external antivirus or anti-malware tool. However, for reasons like security compliance and requirements of security personnel in the team, you may be compelled to use anti-malware.

    Generally, using anti-malware is excellent as a part of your layered security measures. Still, if there is no need to comply with any security audit, installing antivirus in your Kubernetes environment may not be necessary if you have already implemented the best practices of Kubernetes security and integrated DevSecOps principle and security in your CI/CD pipelines.


    Get similar stories in your inbox weekly, for free



    Share this story with your friends
    editorial
    The Chief I/O

    The team behind this website. We help IT leaders, decision-makers and IT professionals understand topics like Distributed Computing, AIOps & Cloud Native

    Latest stories


    DevOps: Report on Devil's Practices by DORA

    The report is drafted from a report release of the annual research and survey of …

    Amazon Elasticsearch Gets a New Version With Name Deprecated

    Accompanied by new advancements is Amazon OpenSearch, the same body of code as its predecessor, …

    McAfee Partners With IBM Security to Deliver TD Synnex Security Solution

    The MVISION platform and Security wing of IBM's partnership endgame are to extend increased protection …

    Amazon MSK Connect Launched to Better Apache Kafka UX

    Amazon follows up on its 2018 data streaming software, Amazon Managed Streaming for Apache Kafka, …

    Cloud: Zone Redundant Storage Released on General Availability

    The report is drafted from a press release of the Microsoft Azure team on the …

    Security: IBM Traces Two-Thirds of Compromises to Misconfigured APIs

    The report is drafted from a sweeping survey of dark web analysis and various X-Force …