Security News > 2022 > November > The pros and cons of using open-source Kubernetes security software
![The pros and cons of using open-source Kubernetes security software](/static/build/img/news/the-pros-and-cons-of-using-open-source-kubernetes-security-software-medium.jpg)
Open source tools are a key part of the Kubernetes security environment, with most companies using open source Kubernetes security software, research by ARMO has revealed.
In a survey of The State of Kubernetes Open Source Security, 55% of respondents said they used at least some open source tools to keep their Kubernetes clusters safe; this includes those who use purely open source and those mix open source and proprietary solutions.
Almost a quarter of respondents use five or more different open source security tools for Kubernetes.
Digging deeper, 69% admit it's difficult or very difficult to integrate open source security tools into their existing Kubernetes stack.
"Open source tools are free, flexible and transparent, but they still tend to be narrow, doing only one thing very well," said Craig Box, VP Open Source at Armo.
"This survey shows that even organizations who use expensive black-box proprietary solutions often choose to use some open source options too. Another approach some companies are taking is to cobble together full Kubernetes security coverage from multiple tools, but then they run into integration challenges and can find themselves buried in alerts."
News URL
https://www.helpnetsecurity.com/2022/11/21/open-source-kubernetes-security/
Related news
- Establishing a security baseline for open source projects (source)
- BLint: Open-source tool to check the security properties of your executables (source)
- OWASP dep-scan: Open-source security and risk audit tool (source)
- Open-source security in AI (source)
- Enhancing security through collaboration with the open-source community (source)
- SELKS: Open-source Suricata IDS/IPS, network security monitoring, threat hunting (source)
- Cilium: Open-source eBPF-based networking, security, observability (source)
- Zeek: Open-source network traffic analysis, security monitoring (source)