Cloud security with Docker and Kubernetes
Ασφάλεια στο υπολογιστικό νέφος με Docker και Kubernetes

Master Thesis
Author
Raftopoulos, Christos
Ραυτόπουλος, Χρήστος
Date
2025-02-25Advisor
Xenakis, ChristosΞενάκης, Χρήστος
View/ Open
Keywords
Cloud ; Security ; Docker ; KubernetesAbstract
The rapid adoption of containerization and cloud-native technologies has revolutionized modern IT infrastructure, enabling scalable and efficient application deployment. However, these advancements introduce new security challenges that must be addressed to protect sensitive data and maintain system integrity. This thesis provides a comprehensive examination of security considerations in cloud computing, virtualization, containerization, and orchestration platforms. It begins by exploring the security landscape of cloud computing and virtualization, highlighting the risks and benefits of hypervisor-based and container-based deployments. The research then delves into Docker security, analyzing architectural vulnerabilities, common misconfigurations, and best practices for securing containerized workloads.
This thesis focuses also on Kubernetes security, detailing authentication mechanisms, network security policies, and secrets management to mitigate risks in orchestrated environments. It further explores common misconfiguration scenarios that expose containerized applications to potential attacks. The study also examines both static and dynamic security analysis techniques, demonstrating how security tools can be integrated to enhance proactive threat detection. Additionally, case studies of real-world security incidents illustrate the impact of misconfigurations and the importance of implementing robust security measures.
Finally, this thesis presents best practices for hardening Docker and Kubernetes environments, including enforcing strict access controls, securing API communications, and applying network segmentation. The research emphasizes the necessity of a defense-in-depth approach, combining runtime monitoring, automated compliance enforcement, and continuous security assessments. By leveraging industry standards and security frameworks, this work provides practical guidance for securing containerized applications in cloud environments.