CipherTrust Transparent Encryption for Kubernetes enables protection of sensitive data on persistent volumes via encryption, user and process-based access controls, and data access logging. This solution enables developers to establish security controls inside of containers. With this extension for CipherTrust Transparent Encryption, data protection can be applied on a per-container basis, both to data inside of containers and to external storage accessible from containers.
CipherTrust Transparent Encryption for Kubernetes addresses compliance requirements and regulatory mandates for protecting sensitive data, such as payment cards, healthcare records, and other sensitive assets.
Protection from privileged-user threats
The solution offers encryption with data access control. This lets privileged users, such as Kubernetes cluster administrators, operate as regular users without gaining unauthorized access to sensitive data.
Achieve robust security
CipherTrust Transparent Encryption for Kubernetes enforces data security policies wherever the data is stored or used, including data centers, virtualized environments, and even in cloud implementations. Your organization can securely deploy and use Kubernetes applications where needed for cost effectiveness, control, or performance without having to make any changes to applications, containers, or infrastructure sets.
Comprehensive data security safeguards
CipherTrust Transparent Encryption for Kubernetes extends CipherTrust Transparent Encryption, so security teams can establish data security controls inside of containers. Enterprises can apply encryption, access control, and data access logging on a per-container basis. Encryption is applied to persistent volumes attached to containerized applications with the ability to restrict data access to approved set of users and processes.
Transparent encryption lets users establish data security controls without having to make any changes to applications, containers, or infrastructure sets. The solution supports common container micro-services deployment models. This enables deploying same protection policies for all persistent volumes attached to an application pod or have unique encryption and access control for each persistent volume in a Kubernetes Cluster.
Granular access controls and visibility
CipherTrust Transparent Encryption for Kubernetes offers the detailed visibility and control you need to comply with the most stringent regulations, policies, and mandates. Enterprises can establish granular access policies based on specific users, processes, and resource sets within containers. In addition, this solution can establish isolation between containers, so only authorized containers can access sensitive information.
CipherTrust Transparent Encryption for Kubernetes
Modern applications are increasingly built using containers, which are microservices packaged with their configurations and dependencies. Kubernetes is an open-source software for deploying and managing these containers. Containerized applications can be delivered, deployed and managed faster with Kubernetes to provide improved efficiency through re-usable modular components, cost savings through optimized resource utilization and reduced licensing expenses.