TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Kubernetes Security Best Practices

195 点作者 stablemap超过 6 年前

8 条评论

alpb超过 6 年前
It is unrealistic to fit Kubernetes Security Best Practices into a single blog post. Here are MANY other blog posts or other very similar content:<p><a href="https:&#x2F;&#x2F;kubernetes.io&#x2F;blog&#x2F;2016&#x2F;08&#x2F;security-best-practices-kubernetes-deployment&#x2F;" rel="nofollow">https:&#x2F;&#x2F;kubernetes.io&#x2F;blog&#x2F;2016&#x2F;08&#x2F;security-best-practices-k...</a><p><a href="https:&#x2F;&#x2F;www.aquasec.com&#x2F;wiki&#x2F;display&#x2F;containers&#x2F;Kubernetes+Security+Best+Practices" rel="nofollow">https:&#x2F;&#x2F;www.aquasec.com&#x2F;wiki&#x2F;display&#x2F;containers&#x2F;Kubernetes+S...</a><p><a href="https:&#x2F;&#x2F;dev.to&#x2F;petermbenjamin&#x2F;kubernetes-security-best-practices-hlk" rel="nofollow">https:&#x2F;&#x2F;dev.to&#x2F;petermbenjamin&#x2F;kubernetes-security-best-pract...</a><p><a href="https:&#x2F;&#x2F;techbeacon.com&#x2F;hackers-guide-kubernetes-security" rel="nofollow">https:&#x2F;&#x2F;techbeacon.com&#x2F;hackers-guide-kubernetes-security</a><p><a href="https:&#x2F;&#x2F;www.sumologic.com&#x2F;blog&#x2F;devops&#x2F;kubernetes-security-best-practices&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.sumologic.com&#x2F;blog&#x2F;devops&#x2F;kubernetes-security-be...</a><p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16764743" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16764743</a><p><a href="https:&#x2F;&#x2F;speakerdeck.com&#x2F;ianlewis&#x2F;kubernetes-security-best-practices" rel="nofollow">https:&#x2F;&#x2F;speakerdeck.com&#x2F;ianlewis&#x2F;kubernetes-security-best-pr...</a><p><a href="https:&#x2F;&#x2F;dzone.com&#x2F;articles&#x2F;kubernetes-security-best-practices" rel="nofollow">https:&#x2F;&#x2F;dzone.com&#x2F;articles&#x2F;kubernetes-security-best-practice...</a><p>and a quick search reveals a full length e-book about it:<p><a href="https:&#x2F;&#x2F;info.aquasec.com&#x2F;kubernetes-security-sem" rel="nofollow">https:&#x2F;&#x2F;info.aquasec.com&#x2F;kubernetes-security-sem</a> (<a href="https:&#x2F;&#x2F;kubernetes-security.info&#x2F;" rel="nofollow">https:&#x2F;&#x2F;kubernetes-security.info&#x2F;</a>)<p><a href="https:&#x2F;&#x2F;cdn2.hubspot.net&#x2F;hubfs&#x2F;1665891&#x2F;Assets&#x2F;Kubernetes%20Security%20-%20Operating%20Kubernetes%20Clusters%20and%20Applications%20Safely.pdf?t=1538587424944&amp;_hsenc=p2ANqtz-_7jbqtRATdJAm7eFxtd5u4nVLYuIlrF67z5qbslZ10-I63-RZ4ogqu9iuuEMsx7fskPYWww2jDpVjOvrLs" rel="nofollow">https:&#x2F;&#x2F;cdn2.hubspot.net&#x2F;hubfs&#x2F;1665891&#x2F;Assets&#x2F;Kubernetes%20S...</a>
xwvvvvwx超过 6 年前
<i>Earlier this year, Tesla suffered a complex cryptocurrency mining malware infection caused by a misconfiguration in the Kubernetes console. The attackers exploited the fact that the particular Kubernetes console wasn’t password protected, allowing them to access one of the pods that included access credentials for Tesla’s larger AWS environment</i><p>Given the amount of driving data that Tesla has, and the apparent scope of the breach, I’m surprised the attackers only mined some crypto. Wonder if that’s because the data is well segregated, or if mining crypto is just more profitable than extracting and leaking data?
评论 #18907344 未加载
评论 #18907387 未加载
评论 #18907060 未加载
评论 #18907195 未加载
评论 #18907259 未加载
评论 #18907379 未加载
colemickens超过 6 年前
Something I often don&#x27;t see mentioned -- be wary of older (as-in lifetime, not version), long-running clusters. I have found multiple times where a product has some vulnerabilities because I can land myself into an &quot;older&quot; cluster that predated various security enhancements that were made to: provisioning, iaas lockdown, etc, that will old clusters will almost surely not benefit from due to the nature of the &quot;fixes&quot; being in the initial configuration.<p>(As an example, &quot;SomeProduct&quot; allowed users to run somewhat arbitrary, non-privileged, non-root containers. I assumed it was K8s and poked around. All clusters were on GCE and ostensibly running the same versions, but due to how they were initially deployed, had different levels of vulnerability. The older clusters predated GCE blocking the metadata server, and predated the existence of TLS bootstrapping for kubelet, so for some of their clusters, it was easy to grab the kubelets key+cert and impersonate the kubelet as an unprivileged user. It sort of requires having someone paying a fair amount of attention upstream and&#x2F;or knowing details of k8s provisioning to catch some of these things.)
leetbulb超过 6 年前
What about PKI? I ran a decent size K8s cluster for a while and proper PKI was a pretty important thing IMHO. Everything running in a K8s environment supports PKI (roots, intermediates, client &#x2F; server cn &#x2F; rbac verification, etc) and there&#x27;s no excuse to set things up properly when tools like cfssl exist and can be automated in deployment pipelines.<p>Edit: CRL[0] and OCSP(maybe?) appear to be coming soon.<p>0: <a href="https:&#x2F;&#x2F;github.com&#x2F;kubernetes&#x2F;kubernetes&#x2F;issues&#x2F;18982" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;kubernetes&#x2F;kubernetes&#x2F;issues&#x2F;18982</a>
评论 #18909606 未加载
quantumwoke超过 6 年前
The thing I love about Kubernetes is that it&#x27;s batteries included and enterprise-first. Sure, it&#x27;s not as simple as docker but when crunch time hits and you need security depth the configurability of Kubernetes is unmatched. Perhaps it just needs to be surfaced better.
slyall超过 6 年前
I got forwarded the CIS Securing Kubernetes benchmark document a few days back. That had around 100 things that should be set on a cluster for your Enterprise&#x27;s next security audit.<p><a href="https:&#x2F;&#x2F;www.cisecurity.org&#x2F;benchmark&#x2F;kubernetes&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.cisecurity.org&#x2F;benchmark&#x2F;kubernetes&#x2F;</a>
评论 #18909139 未加载
Bucephalus355超过 6 年前
One of the better Docker security tutorials I’ve seen so far: <a href="https:&#x2F;&#x2F;www.katacoda.com&#x2F;courses&#x2F;docker-security" rel="nofollow">https:&#x2F;&#x2F;www.katacoda.com&#x2F;courses&#x2F;docker-security</a>
pragmaticlurker超过 6 年前
the first best practice would be not using Kubernetes, as long as it calls &quot;home&quot;.