Kubesploit – Telegram
Kubesploit
1.95K subscribers
824 photos
128 videos
1.61K links
News and links on Kubernetes security curated by the @Learnk8s team
Website: https://kubesploit.io/
Download Telegram
Lockbox is a secure way to store Kubernetes Secrets offline. Secrets are asymmetrically encrypted, and can only be decrypted by the Lockbox Kubernetes controller

Read on: https://github.com/cloudflare/lockbox
Choosing the right policy-as-code solution for your Kubernetes cluster:

- OPA
- Gatekeeper
- Kyverno
- k-rail
- MagTape

More: https://aws.amazon.com/blogs/containers/policy-based-countermeasures-for-kubernetes-part-1
How monero miners target and exploit cloud native dev environments

Read more: https://blog.aquasec.com/monero-miners-target-bitbucket-dockerhub
Trivy is a Simple and Comprehensive Vulnerability Scanner for Container Images, Git Repositories and Filesystems. Suitable for CI

Read more https://github.com/aquasecurity/trivy
Kube-secret-syncer is a Kubernetes operator developed using the Kubebuilder framework that keeps the values of Kubernetes Secrets synchronised to secrets in AWS Secrets Manager

Read on: https://github.com/contentful-labs/kube-secret-syncer
Popeye is a utility that scans live Kubernetes cluster and reports potential issues with deployed resources and configurations. It sanitizes your cluster based on what's deployed and not what's sitting on disk.

https://github.com/derailed/popeye
The kube-secrets-init is a Kubernetes mutating admission webhook, that mutates any K8s Pod that is using specially prefixed environment variables, directly or from Kubernetes as Secret or ConfigMap

👉 https://github.com/doitintl/kube-secrets-init
cosign is a tool that can sign container images. Cosign supports:

- Hardware and KMS signing
- Bring-your-own PKI
- Our free OIDC PKI (Fulcio)

https://github.com/sigstore/cosign
Kubestriker is a platform-agnostic tool designed to tackle Kuberenetes cluster security issues due to misconfigurations

https://github.com/vchinnipilli/kubestriker
This blog post is about an experiment to automate creation of Kubernetes Network Policies based on actual network traffic captured from applications running on a Kubernetes cluster

More: https://itnext.io/generating-kubernetes-network-policies-by-sniffing-network-traffic-6d5135fe77db