A summary of actions to secure Kubernetes
The crypto mine hackers can harvest Kubernetes clusters to earn crypto mining dollars. attacks on Tesla and the 2019 Discovery of Docker engine worm were a few early examples of such attacks?
Here is a summary of? actions that a Kubernetes cluster owner can take to secure it
Basics?
领英推荐
Build and Deploy processes security
Runtime and operations security
Ajmal Mahmood
Senior Solutions Engineer (Containers|Kubernetes|Google Cloud Infrastructure)
3 年Nice write up Ajmal! I would also add a couple more points from networking perspective, like having private clusters can help, that is not assigning the nodes an external IP, if out bound internet access is needed, consider NAT and lastly protect the control plane end points, managed Kubernetes on public clouds like Google or AWS provide ways to do so, like creating private clusters (no exposed public IP assigned to control plane) or even if control plane have to have an external IP, add authorized source CIDR blocks to access it, thus sort of putting it behind a virtual L4 firewall.
2x AWS | 1x GCP | 1x Kubernetes | 1x Terraform Certified DevOps Engineer
3 年Very important blog to read.