• Protect assets • Security for customer applications • Personal information • Comply with laws, standards • New tech and evolving rapidly (opensource based)
for Production status • Traditional security model vs new technology “System must record all attempts to initiate a communication channel (cryptographically secured or not) or initiate intended data exchanges with other system, or deposit data in intended data storage areas.” Clause-7,Item-68:
security • Sessions with security officer • Continuous input/feedbacks from customers (tenants) • Grant new capabilities to applications only when needed
E I W W W W W W W W W W W W I I F5 F5 F5 Datacenter 1 Datacenter 2 Prod Test M E I W Master Etcd node Infra node Worker node 50 nodes 4 cores per worker node 30 GB per node (50% mem use)
Separate sensitive information from application pods • Easy access via env variables/volumes • Securely delivered to nodes (TLS) • Centralized management and storage
version 3.6 • Not just secrets, any Kubernetes resource (like configmaps) maybe stored encrypted. • Requires etcd schema v3. • Simple to implement (using an encryption_config.yaml file). • Migration of existing resources possible via oc adm command.
calls to the API server on the masters • Enable on the master-config.yaml • Snippet of the audit.log: auditConfig: enabled: true 2017-10-23T13:54:25.651410376Z AUDIT: id="feff384c-c2ab-4f66-8e4e-af1000fb5aa1" ip="10.239.24.14" method="PUT" user="[email protected]" groups="\"system_admins\",\"system:authenticated:oauth\",\"system:authenticated\"" as="<self>" asgroups="<lookup>" namespace="<none>" uri="/oapi/v1/groups/system_admins" 2017-10-23T13:54:25.656698821Z AUDIT: id="feff384c-c2ab-4f66-8e4e-af1000fb5aa1" response="200"
failed login attempts • Someone gives someone high privilege role • Some plays with etcd data Master audit.log rsyslog daemonset Arcsight (alerting) API server LB