TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Kubernetes Hardening Guidance [pdf]

237 pointsby cjgover 2 years ago

10 comments

raesene9over 2 years ago
This is one of the standards and compliance guides you can use for k8s.<p>The other ones I&#x27;m aware of are<p>- CIS Benchmarks, there&#x27;s coverage for Kubeadm, AKS, EKS, GKE, OpenShift and some others. This is a compliance guide focused on just k8s<p>- DISA STIG for Kubernetes, another compliance guide, they don&#x27;t mention which distribution but it&#x27;s kubeadm from looking at the paths mentioned.<p>- PCI Guidance for containers and container orchestration, this one is recent, it&#x27;s a generic guidance targeted at container environments (docker, k8s etc) for PCI in-scope organizations but TBH it should work for most places (if that one&#x27;s of interest, some more info <a href="https:&#x2F;&#x2F;raesene.github.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;raesene.github.io&#x2F;</a>)<p>Some more details on these <a href="https:&#x2F;&#x2F;www.container-security.site&#x2F;general_information&#x2F;container_security_standards.html" rel="nofollow">https:&#x2F;&#x2F;www.container-security.site&#x2F;general_information&#x2F;cont...</a><p>Making security guidance for k8s is kind of tricky due to the number of distros and changes between versions (<a href="https:&#x2F;&#x2F;raesene.github.io&#x2F;blog&#x2F;2022&#x2F;09&#x2F;20&#x2F;Assessing-Kubernetes-Clusters-for-PCI-Compliance&#x2F;" rel="nofollow">https:&#x2F;&#x2F;raesene.github.io&#x2F;blog&#x2F;2022&#x2F;09&#x2F;20&#x2F;Assessing-Kubernet...</a>)
jackconsidineover 2 years ago
&gt; Kubernetes, frequently abbreviated “K8s” because there are 8 letters between K and S<p>I&#x27;ll be damned. I thought it was because the end kind of sounded like &quot;8-es&quot;
评论 #33103415 未加载
评论 #33100979 未加载
评论 #33107431 未加载
Havocover 2 years ago
I find the fact that the Defense dept issues stuff like this almost more interesting than the content itself. Says a lot about what keeps them up at night
评论 #33101225 未加载
评论 #33104504 未加载
评论 #33111693 未加载
评论 #33098786 未加载
评论 #33105196 未加载
评论 #33100524 未加载
splixover 2 years ago
Is it possible to configure a Kubernetes cluster to run only _signed_ images? I.e., if someone has replaced a Docker in registry is should not be accepted by cluster.
评论 #33098523 未加载
评论 #33102722 未加载
评论 #33098857 未加载
评论 #33098420 未加载
评论 #33100899 未加载
评论 #33098425 未加载
multaniover 2 years ago
For those who are implementing these security guidelines: how do you ensure they have been correctly implemented?<p>Do you have any kind of static check program that can check beforehand that you are going to deploy a hardened kubernetes cluster? Do you have a &quot;live&quot; checker that can verify the actual configuration of a running cluster? Does it run all the time oronce in a while? Also , if you have an automated way of verifying your configuration, which program do you use?<p>I only know about Chef&#x27;s Inspec and the CIS profiles that are available online, but the experience wasn&#x27;t extraordinary and I was wondering what is used in the wild?
评论 #33106355 未加载
评论 #33103699 未加载
评论 #33102472 未加载
评论 #33113912 未加载
评论 #33101639 未加载
alpbover 2 years ago
Prior discussion: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30692794" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30692794</a>
wingmanjdover 2 years ago
Another guide may be the CIS benchmark guide [1].<p>I can&#x27;t attest to efficacy of this particular benchmark from defense.gov (we don&#x27;t use k8s at $DAYJOB), but we&#x27;ve leveraged other benchmarks from CIS for various flavors of Windows&#x2F; Linux.<p>[1] <a href="https:&#x2F;&#x2F;www.cisecurity.org&#x2F;benchmark&#x2F;kubernetes" rel="nofollow">https:&#x2F;&#x2F;www.cisecurity.org&#x2F;benchmark&#x2F;kubernetes</a>
efortisover 2 years ago
The example of appendix A is a PoLA violation (Principle of Least Authority).<p>It has source code in the container. Use an external build server.
gz5over 2 years ago
Well done. From the control plane section:<p>&gt;The Kubernetes API server runs on port 6443, which should be protected by a firewall to accept only expected traffic.<p>How are folks doing this in practice at scale? Managing ACLs for kubectl, admins, workflow systems, distributed worker nodes etc?
评论 #33104768 未加载
评论 #33103658 未加载
SoftTalkerover 2 years ago
I didn&#x27;t read this, but it&#x27;s really tiresome to hear about having to &quot;harden&quot; systems in 2022. They should be &quot;hard&quot; by default. If you need to soften them to make them easier to work with internally, that should be what needs a checklist and instructions.
评论 #33098080 未加载
评论 #33098171 未加载
评论 #33099008 未加载
评论 #33098447 未加载