SlideShare a Scribd company logo
Hardening Kubernetes
by Securing Pods
Suraj Deshmukh
Hi, I’m Suraj Deshmukh
suraj.io
surajd_
surajssd
What is Kubernetes?
● Container orchestrating system.
● Project initiated by Google.
● Has robust API system, scheduler to schedule workloads onto Nodes.
● Uses etcd to store cluster state.
Components of Kubernetes
Image Source:: https://kubernetes.io/docs/concepts/architecture/cloud-controller/
Basic unit of workload - Pod
● Its a group of one or more containers, with shared
storage/network, and a specification for how to run
the containers.
● Pod’s contents are always co-located and
co-scheduled, and run in a shared context.
Image Source:: https://kubernetes.io/docs/concepts/workloads/pods/pod/
Threat Models in Kubernetes
● External attacks
● Compromised containers/nodes OR attack from inside
● Compromised credentials
● Misuse of Legitimate privileges
Threat Models in Kubernetes
● External attacks
● Compromised containers/nodes OR attack from inside
● Compromised credentials
● Misuse of Legitimate privileges
What is attack from inside?
We trust our developers
Image Source:: http://turnoff.us/geek/the-depressed-developer-15/
● Multi-tenant setup where your clients are sharing resources like nodes on the same
cluster.
● An attacker gains access to the container’s shell and what they can do from there.
State of Container and
Kubernetes Security
Secure defaults
There are many ways to deliver an “out of the box” experience for users. However, by default,
the experience should be secure, and it should be up to the user to reduce their security – if they
are allowed. It is imperative for the software environment to have default secure settings which
may be opted out of by the user or other options which may be opted into (commonly known as
Opt-in and Opt-out).
- Open Web Application Security Project
● Some of the bad practices we see are
because of the security being opt-in
than opt-out in most of these
systems.
● People are running root in the
container.
● User namespaces are very new.
● Not so secure by default design.
Image Source:: http://www.commitstrip.com/en/2016/10/14/good-old-adminpassword/
uid0 inside container
What is uid0 in container?
FROM registry.fedoraproject.org/fedora:30
ENTRYPOINT ["sleep", "infinity"]
FROM registry.fedoraproject.org/fedora:30
USER 1000
ENTRYPOINT ["sleep", "infinity"]
Containers don’t contain - Dan Walsh
● Containers are just set of linux kernel technologies that work in conjunction to form the
isolation.
● These technologies are comparatively new in Linux kernel and will mature.
● All these technologies are not battle tested like VM which provides actual isolation.
● There are always ways for a root inside container to break out and do some nasty stuff.
CVE-2019-5736
● If a process is running with UID0 inside the container, it could replace the runc binary
on the host and potentially can gain root on host
● This could have been clearly mitigated if root inside container is restricted by default.
Hardening Kubernetes by Securing Pods
Solution to enforce non-root containers?
Enter Pod Security Policy!
What are PSP?
● It’s a cluster wide Kubernetes resource.
● It helps you assign secure defaults.
● You define various aspects of a pod security context & container security context.
● Define what UID, GID is allowed, capabilities a container can have inside container
PSP Demo
PSP attack Demo
rm -rf /
Where does PSP sit in?
Image Source:: https://thenewstack.io/ebooks/kubernetes/kubernetes-deployment-and-security-patterns/
State of PSPs
On Managed Kubernetes offering
In helm charts
Improving this state
● Educating folks of this awesome feature is the way to go
● The current state we are in because security has been an afterthought.
● Use secure practices from day1 of the development phase.
● The docker images and helm charts need a revamp.
Secure Software Development Lifecycle S-SDLC
Security should be given a iterative approach and not a waterfall one.
- Cindy Blake
Defense in depth - PSPs are not enough
● Network Policy
● Secure image building practices
● Audit Logging
● Avoid mounting service accounts
● Permissions on demand in RBAC
● Use containers that actually contain, e.g. katacontainers, kubevirt, gvisor, etc.
● Use admission plugin DenyEscalatingExec
● Containers don’t contain by Dan Walsh https://www.youtube.com/watch?v=a9lE9Urr6AQ
● Kubernetes Deployment and Security Patterns https://thenewstack.io/ebooks/kubernetes/kubernetes-deployment-and-security-patterns/
● GKE Using PodSecurityPolicies https://cloud.google.com/kubernetes-engine/docs/how-to/pod-security-policies
● EKS support for PSP https://github.com/aws/containers-roadmap/issues/174
● Hardening your cluster's security https://cloud.google.com/kubernetes-engine/docs/how-to/hardening-your-cluster
● Securing a Cluster https://kubernetes.io/docs/tasks/administer-cluster/securing-a-cluster/
● Runc and CVE-2019-5736 https://kubernetes.io/blog/2019/02/11/runc-and-cve-2019-5736/
● CVE-2019-5736 Detail https://nvd.nist.gov/vuln/detail/CVE-2019-5736
● Kubernetes Security - Michael Hausenblas, Liz Rice https://www.oreilly.com/library/view/kubernetes-security/9781492039075/
● Kubernetes logo https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png
● TheNewStack's - Kubernetes Deployment and Security Patterns
https://thenewstack.io/ebooks/kubernetes/kubernetes-deployment-and-security-patterns/
● How to Secure Your Kubernetes Clusters - Cindy Blake https://youtu.be/M6db_dK0HF4
● Images running root stats https://github.com/surajssd/container-image-stats
● Running with Scissors - Liz Rice https://www.youtube.com/watch?v=ltrV-Qmh3oY
● Dilbert comic about firewall https://dilbert.com/strip/2013-04-07
● AWS EKS Pod Security Policy support PR https://aws.amazon.com/blogs/opensource/using-pod-security-policies-amazon-eks-clusters/
● OWASP secure defaults https://www.owasp.org/index.php/Establish_secure_defaults
References
Thank You

More Related Content

PPTX
Kubernetes and container security
Volodymyr Shynkar
 
PDF
Kubernetes security
Thomas Fricke
 
PDF
Kubernetes: A Short Introduction (2019)
Megan O'Keefe
 
PDF
Introduction to Kubernetes Workshop
Bob Killen
 
PDF
Kubernetes Networking
CJ Cullen
 
PDF
Container Security Deep Dive & Kubernetes
Aqua Security
 
PDF
Introduction to kubernetes
Raffaele Di Fazio
 
PDF
Kubernetes Application Deployment with Helm - A beginner Guide!
Krishna-Kumar
 
Kubernetes and container security
Volodymyr Shynkar
 
Kubernetes security
Thomas Fricke
 
Kubernetes: A Short Introduction (2019)
Megan O'Keefe
 
Introduction to Kubernetes Workshop
Bob Killen
 
Kubernetes Networking
CJ Cullen
 
Container Security Deep Dive & Kubernetes
Aqua Security
 
Introduction to kubernetes
Raffaele Di Fazio
 
Kubernetes Application Deployment with Helm - A beginner Guide!
Krishna-Kumar
 

What's hot (20)

ODP
Kubernetes Architecture
Knoldus Inc.
 
PPTX
Docker Networking Overview
Sreenivas Makam
 
PPTX
Kubernetes for Beginners: An Introductory Guide
Bytemark
 
PPTX
DevOps with Kubernetes
EastBanc Tachnologies
 
PDF
Docker and Kubernetes 101 workshop
Sathish VJ
 
PDF
What Is Helm
AMELIAOLIVIA2
 
PPTX
01. Kubernetes-PPT.pptx
TamalBanerjee16
 
PDF
What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...
Edureka!
 
PPTX
Kubernetes Basics
Rishabh Kumar
 
PDF
Gitlab, GitOps & ArgoCD
Haggai Philip Zagury
 
PDF
Kubernetes design principles, patterns and ecosystem
Sreenivas Makam
 
PDF
An intro to Kubernetes operators
J On The Beach
 
PDF
Kubernetes Architecture | Understanding Kubernetes Components | Kubernetes Tu...
Edureka!
 
PDF
Kubernetes 101
Winton Winton
 
PDF
Linux Container Technology 101
inside-BigData.com
 
PPTX
Kubernetes presentation
GauranG Bajpai
 
PPTX
Docker Ecosystem on Azure
Patrick Chanezon
 
PDF
Best Practices with Azure Kubernetes Services
QAware GmbH
 
PDF
Introduction to kubernetes
Gabriel Carro
 
Kubernetes Architecture
Knoldus Inc.
 
Docker Networking Overview
Sreenivas Makam
 
Kubernetes for Beginners: An Introductory Guide
Bytemark
 
DevOps with Kubernetes
EastBanc Tachnologies
 
Docker and Kubernetes 101 workshop
Sathish VJ
 
What Is Helm
AMELIAOLIVIA2
 
01. Kubernetes-PPT.pptx
TamalBanerjee16
 
What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...
Edureka!
 
Kubernetes Basics
Rishabh Kumar
 
Gitlab, GitOps & ArgoCD
Haggai Philip Zagury
 
Kubernetes design principles, patterns and ecosystem
Sreenivas Makam
 
An intro to Kubernetes operators
J On The Beach
 
Kubernetes Architecture | Understanding Kubernetes Components | Kubernetes Tu...
Edureka!
 
Kubernetes 101
Winton Winton
 
Linux Container Technology 101
inside-BigData.com
 
Kubernetes presentation
GauranG Bajpai
 
Docker Ecosystem on Azure
Patrick Chanezon
 
Best Practices with Azure Kubernetes Services
QAware GmbH
 
Introduction to kubernetes
Gabriel Carro
 
Ad

Similar to Hardening Kubernetes by Securing Pods (20)

PDF
The Future of Security and Productivity in Our Newly Remote World
DevOps.com
 
PDF
Container Security
AgileNetwork
 
PDF
Kubernetes 101 for_penetration_testers_-_null_mumbai
n|u - The Open Security Community
 
PDF
DevSecCon Lightning 2021- Container defaults are a hackers best friend
Eric Smalling
 
PDF
Docker Enterprise Deployment Planning
Stephane Woillez
 
PDF
Strategy, planning and governance for enterprise deployments of containers - ...
The Incredible Automation Day
 
PDF
Commit to excellence - Java in containers
Red Hat Developers
 
PPTX
"Docker best practice", Станислав Коленкин (senior devops, DataArt)
DataArt
 
PDF
Python Web Conference 2022 - Why should devs care about container security.pdf
Eric Smalling
 
ODP
Kubernetes best practices.odf
Akash Agrawal
 
PDF
Container Stranger Danger - Why should devs care about container security
Eric Smalling
 
PDF
Why Should Developers Care About Container Security?
All Things Open
 
PDF
ATO 2022 - Why should devs care about container security.pdf
Eric Smalling
 
PDF
Real-World Docker: 10 Things We've Learned
RightScale
 
PDF
Docker Containers Security
Stephane Woillez
 
PPTX
Secure container: Kata container and gVisor
Ching-Hsuan Yen
 
PDF
Understanding Kubernetes
Tu Pham
 
PDF
CloudNativeTurkey - Lines of Defence.pdf
Koray Oksay
 
PDF
Why should developers care about container security?
Eric Smalling
 
PDF
The Kubernetes Effect
Bilgin Ibryam
 
The Future of Security and Productivity in Our Newly Remote World
DevOps.com
 
Container Security
AgileNetwork
 
Kubernetes 101 for_penetration_testers_-_null_mumbai
n|u - The Open Security Community
 
DevSecCon Lightning 2021- Container defaults are a hackers best friend
Eric Smalling
 
Docker Enterprise Deployment Planning
Stephane Woillez
 
Strategy, planning and governance for enterprise deployments of containers - ...
The Incredible Automation Day
 
Commit to excellence - Java in containers
Red Hat Developers
 
"Docker best practice", Станислав Коленкин (senior devops, DataArt)
DataArt
 
Python Web Conference 2022 - Why should devs care about container security.pdf
Eric Smalling
 
Kubernetes best practices.odf
Akash Agrawal
 
Container Stranger Danger - Why should devs care about container security
Eric Smalling
 
Why Should Developers Care About Container Security?
All Things Open
 
ATO 2022 - Why should devs care about container security.pdf
Eric Smalling
 
Real-World Docker: 10 Things We've Learned
RightScale
 
Docker Containers Security
Stephane Woillez
 
Secure container: Kata container and gVisor
Ching-Hsuan Yen
 
Understanding Kubernetes
Tu Pham
 
CloudNativeTurkey - Lines of Defence.pdf
Koray Oksay
 
Why should developers care about container security?
Eric Smalling
 
The Kubernetes Effect
Bilgin Ibryam
 
Ad

More from Suraj Deshmukh (13)

PDF
Building Container Defence Executable at a Time.pdf
Suraj Deshmukh
 
PDF
Kubernetes psp and beyond
Suraj Deshmukh
 
PDF
Kubernetes Security Updates from Kubecon 2018 Seattle
Suraj Deshmukh
 
PDF
Making kubernetes simple for developers
Suraj Deshmukh
 
PDF
Microservices on Kubernetes - The simple way
Suraj Deshmukh
 
PDF
Kubernetes on CRI-O
Suraj Deshmukh
 
PDF
Taking containers from development to production
Suraj Deshmukh
 
PDF
JSONSchema with golang
Suraj Deshmukh
 
PDF
What's new in kubernetes 1.3?
Suraj Deshmukh
 
PDF
Python testing using mock and pytest
Suraj Deshmukh
 
PDF
OpenShift meetup Bangalore
Suraj Deshmukh
 
PDF
macvlan and ipvlan
Suraj Deshmukh
 
PDF
Henge
Suraj Deshmukh
 
Building Container Defence Executable at a Time.pdf
Suraj Deshmukh
 
Kubernetes psp and beyond
Suraj Deshmukh
 
Kubernetes Security Updates from Kubecon 2018 Seattle
Suraj Deshmukh
 
Making kubernetes simple for developers
Suraj Deshmukh
 
Microservices on Kubernetes - The simple way
Suraj Deshmukh
 
Kubernetes on CRI-O
Suraj Deshmukh
 
Taking containers from development to production
Suraj Deshmukh
 
JSONSchema with golang
Suraj Deshmukh
 
What's new in kubernetes 1.3?
Suraj Deshmukh
 
Python testing using mock and pytest
Suraj Deshmukh
 
OpenShift meetup Bangalore
Suraj Deshmukh
 
macvlan and ipvlan
Suraj Deshmukh
 

Recently uploaded (20)

PPTX
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
PDF
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
PPTX
classification of computer and basic part of digital computer
ravisinghrajpurohit3
 
PDF
Exploring AI Agents in Process Industries
amoreira6
 
PDF
What to consider before purchasing Microsoft 365 Business Premium_PDF.pdf
Q-Advise
 
PPTX
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 
PDF
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
PPTX
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
PDF
lesson-2-rules-of-netiquette.pdf.bshhsjdj
jasmenrojas249
 
PPTX
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
PDF
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
PDF
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
PDF
MiniTool Power Data Recovery Crack New Pre Activated Version Latest 2025
imang66g
 
PPTX
Presentation about variables and constant.pptx
kr2589474
 
PDF
Immersive experiences: what Pharo users do!
ESUG
 
PDF
WatchTraderHub - Watch Dealer software with inventory management and multi-ch...
WatchDealer Pavel
 
PDF
49784907924775488180_LRN2959_Data_Pump_23ai.pdf
Abilash868456
 
PDF
Bandai Playdia The Book - David Glotz
BluePanther6
 
PDF
Protecting the Digital World Cyber Securit
dnthakkar16
 
PDF
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
classification of computer and basic part of digital computer
ravisinghrajpurohit3
 
Exploring AI Agents in Process Industries
amoreira6
 
What to consider before purchasing Microsoft 365 Business Premium_PDF.pdf
Q-Advise
 
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
lesson-2-rules-of-netiquette.pdf.bshhsjdj
jasmenrojas249
 
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
MiniTool Power Data Recovery Crack New Pre Activated Version Latest 2025
imang66g
 
Presentation about variables and constant.pptx
kr2589474
 
Immersive experiences: what Pharo users do!
ESUG
 
WatchTraderHub - Watch Dealer software with inventory management and multi-ch...
WatchDealer Pavel
 
49784907924775488180_LRN2959_Data_Pump_23ai.pdf
Abilash868456
 
Bandai Playdia The Book - David Glotz
BluePanther6
 
Protecting the Digital World Cyber Securit
dnthakkar16
 
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 

Hardening Kubernetes by Securing Pods

  • 1. Hardening Kubernetes by Securing Pods Suraj Deshmukh
  • 2. Hi, I’m Suraj Deshmukh suraj.io surajd_ surajssd
  • 3. What is Kubernetes? ● Container orchestrating system. ● Project initiated by Google. ● Has robust API system, scheduler to schedule workloads onto Nodes. ● Uses etcd to store cluster state.
  • 4. Components of Kubernetes Image Source:: https://kubernetes.io/docs/concepts/architecture/cloud-controller/
  • 5. Basic unit of workload - Pod ● Its a group of one or more containers, with shared storage/network, and a specification for how to run the containers. ● Pod’s contents are always co-located and co-scheduled, and run in a shared context. Image Source:: https://kubernetes.io/docs/concepts/workloads/pods/pod/
  • 6. Threat Models in Kubernetes ● External attacks ● Compromised containers/nodes OR attack from inside ● Compromised credentials ● Misuse of Legitimate privileges
  • 7. Threat Models in Kubernetes ● External attacks ● Compromised containers/nodes OR attack from inside ● Compromised credentials ● Misuse of Legitimate privileges
  • 8. What is attack from inside?
  • 9. We trust our developers Image Source:: http://turnoff.us/geek/the-depressed-developer-15/
  • 10. ● Multi-tenant setup where your clients are sharing resources like nodes on the same cluster. ● An attacker gains access to the container’s shell and what they can do from there.
  • 11. State of Container and Kubernetes Security
  • 12. Secure defaults There are many ways to deliver an “out of the box” experience for users. However, by default, the experience should be secure, and it should be up to the user to reduce their security – if they are allowed. It is imperative for the software environment to have default secure settings which may be opted out of by the user or other options which may be opted into (commonly known as Opt-in and Opt-out). - Open Web Application Security Project
  • 13. ● Some of the bad practices we see are because of the security being opt-in than opt-out in most of these systems. ● People are running root in the container. ● User namespaces are very new. ● Not so secure by default design. Image Source:: http://www.commitstrip.com/en/2016/10/14/good-old-adminpassword/
  • 15. What is uid0 in container? FROM registry.fedoraproject.org/fedora:30 ENTRYPOINT ["sleep", "infinity"] FROM registry.fedoraproject.org/fedora:30 USER 1000 ENTRYPOINT ["sleep", "infinity"]
  • 16. Containers don’t contain - Dan Walsh ● Containers are just set of linux kernel technologies that work in conjunction to form the isolation. ● These technologies are comparatively new in Linux kernel and will mature. ● All these technologies are not battle tested like VM which provides actual isolation. ● There are always ways for a root inside container to break out and do some nasty stuff.
  • 17. CVE-2019-5736 ● If a process is running with UID0 inside the container, it could replace the runc binary on the host and potentially can gain root on host ● This could have been clearly mitigated if root inside container is restricted by default.
  • 19. Solution to enforce non-root containers?
  • 21. What are PSP? ● It’s a cluster wide Kubernetes resource. ● It helps you assign secure defaults. ● You define various aspects of a pod security context & container security context. ● Define what UID, GID is allowed, capabilities a container can have inside container
  • 24. Where does PSP sit in? Image Source:: https://thenewstack.io/ebooks/kubernetes/kubernetes-deployment-and-security-patterns/
  • 28. Improving this state ● Educating folks of this awesome feature is the way to go ● The current state we are in because security has been an afterthought. ● Use secure practices from day1 of the development phase. ● The docker images and helm charts need a revamp.
  • 29. Secure Software Development Lifecycle S-SDLC Security should be given a iterative approach and not a waterfall one. - Cindy Blake
  • 30. Defense in depth - PSPs are not enough ● Network Policy ● Secure image building practices ● Audit Logging ● Avoid mounting service accounts ● Permissions on demand in RBAC ● Use containers that actually contain, e.g. katacontainers, kubevirt, gvisor, etc. ● Use admission plugin DenyEscalatingExec
  • 31. ● Containers don’t contain by Dan Walsh https://www.youtube.com/watch?v=a9lE9Urr6AQ ● Kubernetes Deployment and Security Patterns https://thenewstack.io/ebooks/kubernetes/kubernetes-deployment-and-security-patterns/ ● GKE Using PodSecurityPolicies https://cloud.google.com/kubernetes-engine/docs/how-to/pod-security-policies ● EKS support for PSP https://github.com/aws/containers-roadmap/issues/174 ● Hardening your cluster's security https://cloud.google.com/kubernetes-engine/docs/how-to/hardening-your-cluster ● Securing a Cluster https://kubernetes.io/docs/tasks/administer-cluster/securing-a-cluster/ ● Runc and CVE-2019-5736 https://kubernetes.io/blog/2019/02/11/runc-and-cve-2019-5736/ ● CVE-2019-5736 Detail https://nvd.nist.gov/vuln/detail/CVE-2019-5736 ● Kubernetes Security - Michael Hausenblas, Liz Rice https://www.oreilly.com/library/view/kubernetes-security/9781492039075/ ● Kubernetes logo https://github.com/kubernetes/kubernetes/blob/master/logo/logo.png ● TheNewStack's - Kubernetes Deployment and Security Patterns https://thenewstack.io/ebooks/kubernetes/kubernetes-deployment-and-security-patterns/ ● How to Secure Your Kubernetes Clusters - Cindy Blake https://youtu.be/M6db_dK0HF4 ● Images running root stats https://github.com/surajssd/container-image-stats ● Running with Scissors - Liz Rice https://www.youtube.com/watch?v=ltrV-Qmh3oY ● Dilbert comic about firewall https://dilbert.com/strip/2013-04-07 ● AWS EKS Pod Security Policy support PR https://aws.amazon.com/blogs/opensource/using-pod-security-policies-amazon-eks-clusters/ ● OWASP secure defaults https://www.owasp.org/index.php/Establish_secure_defaults References