In this article, you will learn how the tools in the OpenShift Platform Plus bundle help an organization maintain and secure network traffic flows in multi cluster OpenShift environments.
More: https://michaelkotelnikov.medium.com/maintaining-network-traffic-compliance-in-multi-cluster-openshift-environments-with-openshift-54fe369aa346
More: https://michaelkotelnikov.medium.com/maintaining-network-traffic-compliance-in-multi-cluster-openshift-environments-with-openshift-54fe369aa346
Kubernetes audit logs are powerful, but only if enabled and correctly configured. This article will help you get started using audit logs, and show you how to get the most out of them.
More: https://containiq.com/post/kubernetes-audit-logs
More: https://containiq.com/post/kubernetes-audit-logs
Forwarded from LearnKube news
The Kubernetes API server exposes an HTTP API that lets end-users, different parts of your cluster, and external components communicate with one another.
But how is access to the API restricted only to authorized users?
In this article, you will cover:
1. The difference between externally managed and internal identities.
2. How the Kubernetes API server implements different authentication plugins to authenticate users, such as static token, bearer token, X509 certificate, OIDC, etc.
3. How Kubernetes assigns identities for internal users with Service Accounts.
4. The difference between tokens created through Secrets and Service Account tokens created by the Kubelet.
5. How Federated OIDC works and how it can be integrated with a cloud provider such as Amazon Web Services.
6. How to use the Token Review API to verify Service Account tokens' validity within the cluster.
Full article here: https://learnk8s.io/authentication-kubernetes
But how is access to the API restricted only to authorized users?
In this article, you will cover:
1. The difference between externally managed and internal identities.
2. How the Kubernetes API server implements different authentication plugins to authenticate users, such as static token, bearer token, X509 certificate, OIDC, etc.
3. How Kubernetes assigns identities for internal users with Service Accounts.
4. The difference between tokens created through Secrets and Service Account tokens created by the Kubelet.
5. How Federated OIDC works and how it can be integrated with a cloud provider such as Amazon Web Services.
6. How to use the Token Review API to verify Service Account tokens' validity within the cluster.
Full article here: https://learnk8s.io/authentication-kubernetes
In this post, you will learn how easily a limited user (such as a developer) can escalate their privileges and become an admin of a cluster which has been set up using kubeadm.
More: https://faun.pub/from-dev-to-admin-an-easy-kubernetes-privilege-escalation-you-should-be-aware-of-the-attack-950e6cf76cac
More: https://faun.pub/from-dev-to-admin-an-easy-kubernetes-privilege-escalation-you-should-be-aware-of-the-attack-950e6cf76cac
The Seccomp Agent is receiving seccomp file denoscriptors from container runtimes and handling system calls on behalf of the containers. Its goal is to support different use cases:
- Unprivileged container builds.
- Support of safe mknod.
More: https://github.com/kinvolk/seccompagent
- Unprivileged container builds.
- Support of safe mknod.
More: https://github.com/kinvolk/seccompagent
GitHub
GitHub - kinvolk/seccompagent: agent for handling seccomp denoscriptors for container runtimes
agent for handling seccomp denoscriptors for container runtimes - kinvolk/seccompagent
ovn-kubernetes has a flaw that allows a system administrator or privileged attacker to create an egress network policy that bypasses existing ingress policies of other pods, allowing network traffic to access pods that should not be reachable.
More: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0567
More: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0567
cve.mitre.org
CVE -
CVE-2022-0567
CVE-2022-0567
The mission of the CVE® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
This article will discuss two architectural approaches to managing secrets with GitOps: encrypted secrets stored in Git and storing a reference to secrets in Git.
More: https://cloud.redhat.com/blog/a-guide-to-secrets-management-with-gitops-and-kubernetes
More: https://cloud.redhat.com/blog/a-guide-to-secrets-management-with-gitops-and-kubernetes
Redhat
A Guide to Secrets Management with GitOps and Kubernetes
Storing confidential data in Git represents a security vulnerability and should not be allowed, even when the Git repository is considered private and implements access controls to limit the audience. How can we overcome this limitation?
Ephemeral containers are temp containers that can be attached after a Pod is created.
But what happens when you use them on a hardened cluster?
The answer is not so obvious as OPA, Kyverno, PSPs, etc. will do their best to (rightly) prevent execution.
More: https://xenitab.github.io/blog/2022/04/12/ephemeral-container-security
But what happens when you use them on a hardened cluster?
The answer is not so obvious as OPA, Kyverno, PSPs, etc. will do their best to (rightly) prevent execution.
More: https://xenitab.github.io/blog/2022/04/12/ephemeral-container-security
xenitab.github.io
Kubernetes Ephemeral Container Security | Xenit
Ephemeral containers is a new concept in Kubernetes which allows attaching containers to already running Pods. It also introduces new security concerns which have to be resolved before it can be enabled.
In Kubernetes, there are two aspects to security: cluster security and application security. In this post, you'll explore how to secure Kubernetes deployments and applications in general.
More: https://armosec.io/blog/secure-kubernetes-deployment
More: https://armosec.io/blog/secure-kubernetes-deployment
ARMO
How to secure Kubernetes Deployment? | ARMO
In this blog post, we’ll explore how to secure Kubernetes deployments and applications in general
Garden is an automation platform for Kubernetes development and testing. In versions prior to 0.12.39 multiple endpoints did not require authentication. In some operating modes this allows for an attacker to gain access to the application erroneously.
More: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24829
More: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24829
cve.mitre.org
CVE -
CVE-2022-24829
CVE-2022-24829
The mission of the CVE® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
Forwarded from LearnKube news
There are several ways to create a data fetching mechanism for the Open Policy Agent - each of them has its pros and cons.
In this guide, you will compare and decide which one is the best for you.
More: https://dev.to/permit_io/load-external-data-into-opa-the-good-the-bad-and-the-ugly-26lc
In this guide, you will compare and decide which one is the best for you.
More: https://dev.to/permit_io/load-external-data-into-opa-the-good-the-bad-and-the-ugly-26lc
Vulnscan is a suite of reporting and analysis tools built on top of Anchore's syft utility (to create software bills of material) and Grype utility (to scan those SBOMs for vulnerabilities). This suite is designed to be run on a kubernetes cluster.
More: https://github.com/davideshay/vulnscan#readme
More: https://github.com/davideshay/vulnscan#readme
Forwarded from LearnKube news
Starboard integrates security tools by incorporating their outputs into Kubernetes CRDs (Custom Resource Definitions) and making security reports accessible through the Kubernetes API.
More: https://github.com/aquasecurity/starboard
More: https://github.com/aquasecurity/starboard
Trousseau uses the Kubernetes KMS provider framework to provide an envelope encryption scheme to encrypt secrets on the fly before they reach etcd.
The project is modular and you can plug your own KMS tool (e.g. Vault).
More: https://github.com/ondat/trousseau
The project is modular and you can plug your own KMS tool (e.g. Vault).
More: https://github.com/ondat/trousseau
This operator scans all SBOMs from a git-repository for vulnerabilities using Grype. The result-list can be emitted as JSON-file served via an endpoint and/or as Prometheus metrics.
More: https://github.com/ckotzbauer/vulnerability-operator
More: https://github.com/ckotzbauer/vulnerability-operator
GitHub
GitHub - ckotzbauer/vulnerability-operator: Scans SBOMs for vulnerabilities with Grype
Scans SBOMs for vulnerabilities with Grype. Contribute to ckotzbauer/vulnerability-operator development by creating an account on GitHub.
[PDF] In this whitepaper, you will discuss the security aspects of different base images for containers.
In other words, the same container (i.e. python) could have more or fewer issues depending on the underlying OS (i.e. Alpine, Debian, etc.)
More: https://chainguard.dev/blog-static/chainguard-all-about-that-base-image.pdf
In other words, the same container (i.e. python) could have more or fewer issues depending on the underlying OS (i.e. Alpine, Debian, etc.)
More: https://chainguard.dev/blog-static/chainguard-all-about-that-base-image.pdf
Tales from a recent pentest of a product hosted on the AWS cloud backed by Kubernetes (EKS) and a whole lot of secure design goodness that withstood the attack attempts.
More: https://blog.appsecco.com/hacking-an-aws-hosted-kubernetes-backed-product-and-failing-904cbe0b7c0d
More: https://blog.appsecco.com/hacking-an-aws-hosted-kubernetes-backed-product-and-failing-904cbe0b7c0d
Learn how the team at Xendit found an issue with Linkerd and TLS on Kubernetes and how they did (not) fix it.
More: https://blog.xendit.engineer/debugging-k8s-issues-intermittent-outbound-tls-issues-with-linkerd-7476f02f3cea
More: https://blog.xendit.engineer/debugging-k8s-issues-intermittent-outbound-tls-issues-with-linkerd-7476f02f3cea
Forwarded from Kube Builders
kubeval is a tool for validating a Kubernetes YAML or JSON configuration file. It does so using schemas generated from the Kubernetes OpenAPI specification, and therefore can validate schemas for multiple versions of Kubernetes.
More: https://github.com/instrumenta/kubeval
More: https://github.com/instrumenta/kubeval
GitHub
GitHub - instrumenta/kubeval: Validate your Kubernetes configuration files, supports multiple Kubernetes versions
Validate your Kubernetes configuration files, supports multiple Kubernetes versions - instrumenta/kubeval
Infra enables you to discover and access infrastructure (e.g. Kubernetes, databases).
It helps you connect an identity provider such as Okta or Azure active directory, and map users/groups with the permissions you set to your infrastructure.
More: https://github.com/infrahq/infra
It helps you connect an identity provider such as Okta or Azure active directory, and map users/groups with the permissions you set to your infrastructure.
More: https://github.com/infrahq/infra