Death by Design: Self-Destructing Containers for Security
Faculty Mentor
aespinoza17@ewu.edu
Presentation Type
Poster
Start Date
May 2025
End Date
May 2025
Location
PUB NCR
Primary Discipline of Presentation
Computer Science
Abstract
In 2024, attackers can capitalize on vulnerable Kubernetes clusters within minutes, accentuating a need for more resilient defenses. Kubernetes thrives on self-healing and scalability but remains susceptible to security gaps that enable lateral movement. This project builds onto Kubernetes cluster security through a preemptive lens, introducing the Cluster Life-cycle Management Systems (CLMS). Inspired by the biological process of apoptosis, the CLMS systematically replaces aging containers and services to prevent exploitation before it begins. By addressing both performance degradation and evolving cyber-security threats, this work raises the bar for the future of secure, highly available Kubernetes environments by protecting next generation cloud-native applications from modern adversaries.
Recommended Citation
Moomaw, Alexander H.; Espinoza, Antonio M.; and Steiner, Stuart, "Death by Design: Self-Destructing Containers for Security" (2025). 2025 Symposium. 13.
https://dc.ewu.edu/srcw_2025/ps_2025/p1_2025/13
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Death by Design: Self-Destructing Containers for Security
PUB NCR
In 2024, attackers can capitalize on vulnerable Kubernetes clusters within minutes, accentuating a need for more resilient defenses. Kubernetes thrives on self-healing and scalability but remains susceptible to security gaps that enable lateral movement. This project builds onto Kubernetes cluster security through a preemptive lens, introducing the Cluster Life-cycle Management Systems (CLMS). Inspired by the biological process of apoptosis, the CLMS systematically replaces aging containers and services to prevent exploitation before it begins. By addressing both performance degradation and evolving cyber-security threats, this work raises the bar for the future of secure, highly available Kubernetes environments by protecting next generation cloud-native applications from modern adversaries.