SHARE
Facebook X Pinterest WhatsApp

Researchers Find 380,000 Open Kubernetes Servers

thumbnail
Researchers Find 380,000 Open Kubernetes Servers

kubernetes

A recent research study found the vast majority of Kubernetes API servers (380,000) to be open to the internet. That makes cloud security all the more challenging, requiring better monitoring, observability, and insights into the interdependencies within cloud-native applications.

Written By
thumbnail
David Curry
David Curry
Jun 13, 2022

Researchers at the Shadowserver Foundation found the vast majority of Kubernetes API servers were exposed to the public internet, a cause for concern given the increase in Kubernetes-based cyberattacks. 

The study, which identified 450,000 Kubernetes API servers, found that 380,000 allowed some form of access. The United States housed the most open servers, with 52% located in the country. 

[Download Now] State of the Cloud: A Security Perspective

See Also: Continuous Intelligence Needed to Parry New Cyber Threats

“While this does not mean that these instances are fully open or vulnerable to an attack, it is likely that this level of access was not intended, and these instances are an unnecessarily exposed attack surface,” said researchers at Shadowserver Foundation. “They also allow for information leakage on version and builds.”

Shadowserver suggests businesses should implement authorization for access at the firewall level, to mitigate exposed attack surface. 

“While Kubernetes provides massive benefits to enterprises for agile app delivery, there are a few characteristics that make it an ideal attack target for exploitation,” said cyber security expert, Erfan Shadabi. “For instance, as a result of having many containers, Kubernetes has a large attack surface that could be exploited if not pre-emptively secured.”

Kubernetes does come with in-built security features, such as role-based access control, pod security policies, and network policies, which if enacted should provide businesses with adequate protection against cyberattacks. However, as Shadabi alluded to, Kubernetes covers a lot of ground and will run whatever containers it is told to run, without scanning for potential vulnerabilities or malicious content. 

This means that businesses need to have good data practices and potentially leverage externals tools to beef up the security gaps presented by the container-based system.

[Download Now] State of the Cloud: A Security Perspective
thumbnail
David Curry

David is a technology writer with several years experience covering all aspects of IoT, from technology to networks to security.

Recommended for you...

Real-time Analytics News for the Week of April 12
Your Next-gen Fail-safe Plan: Enterprise Multi-clusters
Flynn
Mar 5, 2024
What Does the Power of Hybrid Cloud Actually Mean?
Vijay Raman
Jan 10, 2024
Scaling Your Application Infrastructure with Kubernetes & Microservices
Keval Bhogayata
Aug 24, 2023

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.