Note: The following article was written by Mike Vizard and published by ContainerJournal.com on Oct. 2, 2019.
Nubeva Technologies has extended the network decryption software it developed for the Trusted Layer Security (TLS) encryption protocol to application workloads based on containers and Kubernetes clusters.
Steve Perkins, chief marketing officer for Nubeva, says cloud service providers now require IT organizations to use TLS, a cryptographic protocol accepted the Internet Engineering Task Force (IETF) to secure their applications in place of the Secure Socket Layer (SSL) protocol. However, DevOps teams deploying cloud-native applications based on containers and Kubernetes presently lack visibility into applications encrypted using TLS.
Nubeva TLS 1.3 Decrypt obtains the keys from any north/south or east/west session to provide visibility into traffic running in and out of containers to enable both real-time monitoring and forensics of Kubernetes deployments, including variants of Kubernetes such as Amazon Elastic Kubernetes Service (Amazon EKS), Azure Kubernetes Service (AKS) and Google Kubernetes Environment (GKE), Perkins says.
The encryption keys are discovered and extracted from certificates using a Symmetric Key Intercept architecture that inserts agent software running in memory which employs signatures infused with machine learning algorithms to decrypt traffic. Once the keys are stored, users can decrypt the encrypted data in motion at scale, Perkins says. Nubeva claims the key extraction agent consumes less than 1% of compute resources on a single CPU core for all the workloads on a node configured with a few megabytes of memory. Because Nubeva runs in user space, it’s completely platform-independent, he adds.
To read the entire article, click here.