by beprogrammed on 8/3/2021, 6:42:29 PM
by raesene9 on 8/3/2021, 5:21:01 PM
Some useful guidance here, although worth noting that some of it is a bit dated (k8s security can move quickly).
Most notably from a scan through, they're mentioning PodSecurityPolicy, but that's deprecated and scheduled to be removed in 1.25.
There will be an in-tree replacement but it won't work the same way. Out of tree open source options would be things like OPA, Kyverno, jsPolicy, k-rail or Kubewarden.
by __app_dev__ on 8/3/2021, 7:02:15 PM
I used to study and focus on security a lot more and keep up with trends. After several interviews this year I realize a lot of jobs prioritize leetcode over everything else. It's pretty annoying and makes me wonder if the focus for tech works is leetcode above all else then no wonder so many companies have insecure apps and servers.
by nwmcsween on 8/3/2021, 8:28:02 PM
The elephant in the room here is almost all containers according to artifacthub.io, etc are a complete tire fire
by rob_c on 8/4/2021, 1:54:49 AM
A lot of this applies to containers in general. Not complaining, it's well written but wish they would break out the none kube container stuff into a general container-sec advice for people.
by kgarten on 8/3/2021, 11:36:52 PM
How do I know that this advice is useful and does not put me in danger?
Example: NSA recommends to use RSA encryption.
https://www.theverge.com/2013/12/20/5231006/nsa-paid-10-mill...
by kenm47 on 8/3/2021, 7:53:28 PM
so... a lot of this can be done with Fairwind's OSS tool Polaris... https://github.com/FairwindsOps/polaris
feels good that we've been addressing this for a bit already tbh. (disclaimer, I work for fairwinds)
by pletnes on 8/3/2021, 5:16:45 PM
What yields the lowest risk - spending a ton of time hardening one cluster, or building multiple clusters to reduce the blast radius of bugs and misconfigurations?
by pulketo on 8/4/2021, 12:11:49 AM
A guide from somebody who hates not knowing everything about you... Tengo mis dudas
by neop1x on 8/4/2021, 8:01:40 PM
First you should configure some kind of authentication. It is fun to remember this 3 years old Tesla example [1]: Publicly accessible Kubernetes Dashboard.
[1] https://www.zdnet.com/article/tesla-systems-used-by-hackers-...
by andrewmcwatters on 8/3/2021, 6:26:53 PM
Well that’s… curious. Not sure I’ve ever read the NSA providing hardening guidance on anything before.
by soheil on 8/3/2021, 5:40:19 PM
I keep forgetting NSA's job is to protect instead of maliciously eavesdropping on Americans. Given their prior probability of being a bad actor I'd take any security "guidance" they issue with a huge grain of salt.
by debarshri on 8/3/2021, 6:10:37 PM
This is really helpful. I wonder if there is curated list of k8s hardening guidelines for various organisations.
by Rd6n6 on 8/3/2021, 9:02:11 PM
Do they have a version for ordinary web app servers?
by legrande on 8/3/2021, 6:21:49 PM
We all know it's the National Insecurity Agency[0], and that the NSA hoards & stockpiles 0day. They very rarely release tools and research papers designed to strengthen our IT infra, since they sit on so much 0day. There's no balance.
I don't buy that they're 50% red team, and 50% blue team. More like 99% red team and 1% blue team.
by kchoudhu on 8/3/2021, 5:55:20 PM
Somehow the text is not just...
kubectl -n my-ns delete pod,svc --all
- Scan containers and Pods for vulnerabilities or misconfigurations.
- Run containers and Pods with the least privileges possible.
- Use network separation to control the amount of damage a compromise can cause.
- Use firewalls to limit unneeded network connectivity and encryption to protect confidentiality.
- Use strong authentication and authorization to limit user and administrator access as well as to limit the attack surface.
- Use log auditing so that administrators can monitor activity and be alerted to potential malicious activity.
- Periodically review all Kubernetes settings and use vulnerability scans to help ensure risks are appropriately accounted for and security patches are applied.