Blasting past your security: A Blast Radius Analysis of Container Attacks
In this research, we analyzed real victims’ potential total impact from threat actors, by identifying hosts that have been targeted by real attacks in the wild and then analyzing their external-facing vulnerabilities.
This approach allowed us to determine the blast radius, or total potential impact, of these real-world attacks. Our findings show that many organizations are able to identify and remediate vulnerabilities, but not before they are targeted by a threat actor.
Key findings you'll learn from this report:
- Security by obscurity is not a viable strategy
- Increase visibility by going beyond host-based security tools
- Reduce the attack surface
- Scan your workloads to detect malicious behavior
- Limit accessibility to cloud meta-data