Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Kubernetes security

Kubernetes security

Security in Kubernetes is really, really hard. This is why, and here's what you need to think about when managing a cluster.

Jaakko Pallari

June 11, 2019
Tweet

More Decks by Jaakko Pallari

Other Decks in Technology

Transcript

  1. Kubernetes • etcd encryption • authentication • authorization • dashboard

    access • network policies • pod security policies • secret access • audit logs • sandboxing and runtime protection • security updates • secrets management • certificate rotation Containers • trusted images • image scanning • image patching • custom image storage • non-root user Platform • node-to-node network security • access to nodes (SSH etc.) • security updates • deployment pipeline • multi-tenancy
  2. Kubernetes • etcd encryption • authentication • authorization • dashboard

    access • network policies • pod security policies • secret access • audit logs • sandboxing and runtime protection • security updates • secrets management • certificate rotation Containers • trusted images • image scanning • image patching • custom image storage • non-root user Platform • node-to-node network security • access to nodes (SSH etc.) • security updates • deployment pipeline • multi-tenancy
  3. Production environment Customer data nearby Loss of revenue, trust, reputation

    Legal liability Development environment No real data in sight Devs are inconvenienced at most
  4. TLS for internal comms. Authentication RBAC Network Policies Pod Security

    Policies must have must have for multi-tenancy
  5. 1. Figure out the minimal permissions 2. Create a role

    with the permissions 3. Attach the role to user/group … and Bob’s your uncle! Right?
  6. apiVersion: v1 kind: Pod metadata: name: slurpsecrets spec: containers: -

    image: hackertoolz.io/slurpsecrets name: slurpsecrets volumeMounts: - name: supersecret mountPath: "/secrets" readOnly: true volumes: - name: supersecret secret: secretName: supersecret