Using deception to catch Shai-Hulud‍
  ·  
Webinar / 3rd April
Sign up now
Product
Platform
AWS
AWS
Azure
Azure
CI/CD
CI/CD
Google Cloud
Google Cloud
Identity
Identity
Kubernetes
Kubernetes
Workstations
Workstations
Credentials & artifacts
Credentials & artifacts
Use cases
AI Agent Detection
Cloud & Kubernetes Breach
Insider Threat Detection
Supply Chain & CI/CD Attack
Workstation Compromise
PricingCustomers
Resources
  • ResearchAbout
  • Careers
  • Contact
Community Edition
Book a demoCommunity Edition
All posts
·
Product

Announcing Security Canaries in Kubernetes

Andy Smith

April 14, 2025

March 10, 2026

·

2

min read

I am the text that will be copied.
Tracebit and Kubernetes

We’re excited to share our latest canary module: Kubernetes - this is now available for all Tracebit customers; with native support for AWS EKS, full support for Azure AKS and GCP GKE coming soon.

Why there’s an urgent need for security canaries in Kubernetes

We talk to a lot of security teams about where they might have detection gaps. What’s so great about building a canary platform like Tracebit is we’re not constrained to a particular surface area - cloud, identity, SaaS, workstations - we really want to know it all when understanding pain points that security teams are facing.

In these fairly wide ranging conversations, Kubernetes is by far one of the biggest areas of concern we hear from security teams. It’s a complex beast that defers a good deal of operational responsibility to engineering teams, it enables a great deal but what’s going on inside the cluster from a security perspective can sometimes be a bit of a black box. This is backed by some real world compromises we dive into below as well as a Red Hat Study report where 45% of respondents had encountered Kubernetes runtime security incidents.

Our approach to security canaries in Kubernetes

As usual our approach is to consider attack paths inside Kubernetes clusters and opportunities for canaries to detect and delay attacks.

The flexibility of Kubernetes, which is a source for concern for security teams, also provides a powerful platform for Tracebit to leverage for the automated deployment of canaries.

Here we won’t delve into the secret sauce that enables our security canaries, but we will reveal the threats we have focused on and the security canary outcomes the platform enables.

Pod Compromise: Canary Credentials in Kubernetes Pods

Tracebit Kubernetes Pod Compromise Detection

Container compromise is not unique to Kubernetes, but is naturally front of mind for teams deploying at scale. This could be an exploit in vulnerable code, a supply chain attack or an over-priveleged Engineer’s access being exploited.

It’s important to be able to detect this early stage of an attack. Teams may or may not deploy agents to help with this, but their detections can only go so far.

The Tracebit Kubernetes module can automatically inject canary credentials into Pods. The value in this detection is that the credentials are 1) unique to the Pod 2) refreshed regularly. If these credentials trigger it indicates a threat actor has compromised the pod, taken credentials and used those credentials. A very strong indication, that could also be considered for an automated response.

Cluster Compromise: Canary Resources in Kubernetes Clusters

Tracebit Kubernetes Cluster Compromise Detection

The Kubernetes control plane is a natural cause for concern and a common attack path. Compromise may have occurred via lateral movement from a privileged Pod or compromise of a privileged Engineer's identity.

In such cases, it’s important to be able to quickly detect which principal is compromised and ideally shut down their access.

The Tracebit Kubernetes module takes the same approach as we take to public cloud environments - we’re able to scan and profile the Kubernetes clusters and deploy Kubernetes native resources into them that should never be interacted with. One example would be Kubernetes Secrets - there purely to deceive and detect accounts.

The value in this approach is its dynamism and simplicity - our canary resources are able to change as dynamically as the other resources in the cluster, and the precision of the detections is clear - a high fidelity detection for an event that should not be occurring.

How does it work?

We’ve been quite thoughtful about ensuring a simple, safe deployment - especially for teams with sensitive production workloads. We’ll keep the exact details out of the public eye for now - but the deployment can be up and running in minutes via Helm chart deployment, with source code available for customers who wish to verify independently the actions that Tracebit can and cannot take in their clusters.

Can you share some real-world examples?

This can be really wide ranging - a phish of an engineer can lead to cluster compromise, a supply chain attack can lead to Pod compromise.

For a recent and quite critical example, we'd point to Wiz’s research on IngressNightmare allowing Cluster Compromise.

This attack enabled both Pod and Cluster compromise - providing two opportunities where Tracebit could detect the attack.

Learn more

If security visibility in Kubernetes is a challenge that resonates with you and you’d like to learn more about what we’re doing, we’d love to talk!

The easiest way to get in touch is to book a demo - we can walk you through what we’re doing and dive into the technical details.

‍

Table of contents
Subscribe to our newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to our privacy policy
Thank you for signing up
Something went wrong, please try again
Subscribe to newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to with our Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

The latest security research straight to your inbox

Subscribe to our newsletter to receive regular updates from our research and product teams

By subscribing you agree to our privacy policy
Thank you! Check your inbox for your first edition.
Oops! Something went wrong while submitting the form.
Soc 2 Type 2 imageCheckmark imageAWS Qualified software illustration
Platform
AWS
Azure
CI/CD
Google Cloud
Identity
Kubernetes
Workstations
Credentials & artifacts
Use cases
AI Agent Detection
Cloud & Kubernetes Breach
Insider Threat Detection
Supply Chain & CI/CD Attack
Workstation Compromise
Company
CustomersResearchAboutCareersContactStatusCommunity Edition
Social
© 2026 Tracebit
Privacy PolicyTerms of ServiceCookie Settings