SlideShare a Scribd company logo
Security for Cloud Native Workloads
22-May-2021 | DevSecOps Conf 2020 Runcy Oommen
|In brief|
Generic cloud native & cloud security overview
Shared responsibility model
Microservices security
Containers v/s Serverless
Securing the container lifecycle
Kubernetes security improvements
Career
 Principal SDE, SONICWALL, 18+ yrs. industry experience
primarily in systems, cloud (private/public), security, networking
 10x multi-cloud certified (GCP, AWS, Azure, CNCF)
 Patent (India) in cloud security around distributed data storage
 Interested in serverless, containers and cloud native offerings.
Firm believer of a multi-hybrid cloud future
Community
 Organizer of GDG Cloud, AWS user Group and Cloud Native
meetup groups in Bangalore
 Regular speaker at domestic and international cloud, tech &
security conferences
 Multiple hackathon wins in cloud/security topics.
 Recognized by Google as a community influencer
[~]$ whoami
runcyoommen
https://runcy.me
What does “Cloud Native”
mean?
A cloud computing approach to build &
run scalable apps in modern environments
such as public, private and hybrid clouds.
Technologies such as containers,
microservices, serverless and immutable
infrastructure, deployed are elements of
this architecture.
Reference:
https://en.wikipedia.org/wiki/Cloud_native_computin
IT infrastructure & landscape
has undergone a paradigm
shift…
Traditional view
runcyoommen
Modern view
PaaS
So, how exactly should cloud native
security differ from traditional network
security?
Ubiquitous
The cloud is always reachable
from anywhere, any time, any
device
Scalable
You can add new features and
support users without breaking a
sweat
Integrated
Security and other services talk
to each other for full visibility
Comprehensive
The Cloud scans every byte –
ingress and egress – including SSL
& CDN
Intelligent
The cloud learns from every
user, network and traffic
Important facets of cloud
Available
Capabilities can be guaranteed to
remain accessible
runcyoommen
Cloud Features v/s Security
Balances
 Agility
 Self service
 Scale
 Automation
 Gatekeeper
 Standards
 Control
 Centralized
 Pay as you go  Timely alerts
Shared Responsibility
Model
MONOLITH M-I-C-R-O-S-E-R-V-I-C-E-S
Let’s begin the journey…
from to
Security for cloud native workloads
Security for cloud native workloads
VM
Container
Security for cloud native workloads
 Portability – By abstracting applications
from host, it’s easier to run on any platform
or cloud
 Scalability – Containerized applications
holds the ability to handle increasing
workloads
 Fast Development – Allows developers
to change and track changes in the
platform’s source code ensuring high
productivity
 Security – App isolation ensures that
separate containers run independently
 Continuity – Failure of one will not
influence the state of others
 Easy Management – Orchestration
performs application management, automated
installation and workload management
runcyoommen
Security for cloud native workloads
Security for cloud native workloads
How did we get here?
Security for cloud native workloads
The stack of *SECURITY*
responsibilities…
Sys
Admin
DevOps
Develope
r
SECURING THE CONTAINER LIFECYCLE
BUILD SHIP DEPLOY RUN
Image Quality,
Exposure Risk
Trust, Integrity
Assurance
Resource,
Access Control
Process,
Network, Secrets
VISIBILITY
►Risk posture of the images is not completely understood
►Unclear as to where security should fit in the process
►Containers are not visible with current security tools
►Reliance on open source and external components used
SECURITY STARTS IN THE BUNDLE PHASE
BUILD SHIP DEPLOY RUN
• Make sure base images are secure
• Scan for vulnerabilities on the finished product
• Maintain configuration standards
• Share info between Dev, Ops, Sec
ADD ENFORCEMENT OF IMAGE USAGE
BUILD SHIP DEPLOY RUN
• Deny unknown images or registries
• Accept images based on risk
• Maintain integrity of images
LIMIT ACCESS TO CONTAINER ENGINE
BUILD SHIP DEPLOY RUN
• Separate automation from human actions
• Control parameters that elevate privilege
• Permissions on volumes, network etc…
• Maintain audit trail with accountable user
GRANULAR RUNNING OF CONTAINERS
BUILD SHIP DEPLOY RUN
• Resource management
• Protect sensitive data
• Network segmentation
• Fine-grained app controls
Let’s summarize container security
• Prevent unknown images
Production Host
• Stop user privilege escalation
• Stop suspicious processes
• Enforce network isolation
• Encrypt sensitive vars/params
• Swear by automation and tools
• Visibility across the environment
runcyoomme
KUBERNETES SECURITY IMPROVEMENTS
Disable Anonymous
Authentication
Configure Admission
Controllers
Pod Security
Policies
Enable Authz with
RBAC
Network Policies for
Segmentation
• Disable anonymous authentication
Generally two types of users exist:
– Normal Users (managed by outside entities like LDAP, AD etc.)
– Service Accounts (managed by K8s API with credentials as secrets)
Anything else is treated as anonymous request
– Given a username system:anonymous and group system:unauthenticated
For e.g. with token authentication & anonymous access enabled, a request
with an invalid bearer token would receive a 401 error; a request providing
no bearer token would be treated as an anonymous request.
Recommendation:
Disable this mode by passing --anonymous-auth=false option to API server
• Configure admission controllers
– Intercepts requests to create, delete, modify or connect to proxy
– “validating” or “mutating” (able to modify the object they admit)
Syntax: Replace what appears after = with name of the admission controller
--enable-admission-plugins=NameOfController,NameOfController2
Recommendation:
* Enable below admission controllers by default
LimitRanger,DefaultStorageClass,DefaultTolerationSeconds,Names
paceLifecycle,ServiceAccount,MutatingAdmissionWebhook,Validati
ngAdmissionWebhook,Priority,ResourceQuota,PodSecurityPolicy
* Enable ValidatingAdmissionWebhook to validate K8s resources during
create, update, and delete operations
* Ensure AlwaysPullImages is set to make sure private images are only
pulled by those who have the credentials.
• Disable public access to cluster
• Pod security policies
– Defined as a cluster level resource that controls security sensitive aspects
– Conditions for pod to be admitted in system
– Target pod’s service account must be authorized for this policy
– Implemented as an optional (but recommended) admission controller
– Never expose remote connectivity to your nodecluster
– Use a bastion host in your management VPC
– Ensure it is peered with the cluster network for connectivity
• Enable authorization with RBAC
– Method of regulating access to resources based on the roles of individual users
– RBAC uses the rbac.authorization.k8s.io API group to drive authz decisions
Syntax: Start the API server with the authorization-mode flag for RBAC
kube-apiserver --authorization-mode=RBAC
Potential Mistakes:
– Make sure cluster-admin role is not granted unnecessarily (especially during the
transition from legacy ABAC controller to RBAC)
– Role aggregation (K8s v1.9), if not carefully reviewed can lead to improper usage
– Duplicated role grant may happen; subjects get same access in more than one way
– Unused roles to subjects that do not exist (deleted service accounts) can make it
difficult to see configurations that do matter.
• Network policies for segmentation
– Specification of how groups of pods can communicate with each
other and other network endpoints
– When no network policies are applied, then all connections to
and from it are permitted
– Notion of “pod isolation” which means that pods are isolated if
at least one network policy applies to them
– Intricate and difficult to understand for proper usage. Network
plugins recommended from Calico, Cilium, Kube-router, Romana
and Weave Net
Conclusion
 Think security early and anticipate for future
growth. Honestly, it’s nothing but a mindset!
 Focus on logical and organizational structure to
engrave it into your environment
 Enablement to move fast and break things but
protect from themselves
 Apply security controls at the layers that make
the most sense
 Security is no longer about a “layer on top”. Ensure it
at every step of the SDLC and throughout the stack
Questions | Comments | Discussions
runcyoommen
https://runcy.me
Runcy Oommen

More Related Content

PDF
Cloud Native Security: New Approach for a New Reality
Carlos Andrés García
 
PDF
Cloud Security Introduction
GLC Networks
 
PDF
Security hardening of core AWS services
Runcy Oommen
 
PPTX
Designing A Platform Agnostic HA System
Runcy Oommen
 
PPTX
The Top Cloud Security Issues
HTS Hosting
 
PPTX
CLOUD NATIVE SECURITY
Maganathin Veeraragaloo
 
PPTX
Technologies You Need to Safely Use the Cloud
CloudPassage
 
PPTX
Webinar compiled powerpoint
CloudPassage
 
Cloud Native Security: New Approach for a New Reality
Carlos Andrés García
 
Cloud Security Introduction
GLC Networks
 
Security hardening of core AWS services
Runcy Oommen
 
Designing A Platform Agnostic HA System
Runcy Oommen
 
The Top Cloud Security Issues
HTS Hosting
 
CLOUD NATIVE SECURITY
Maganathin Veeraragaloo
 
Technologies You Need to Safely Use the Cloud
CloudPassage
 
Webinar compiled powerpoint
CloudPassage
 

What's hot (20)

PDF
Managed Threat Detection & Response for AWS Applications
Alert Logic
 
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
Alert Logic
 
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
Alert Logic
 
PDF
Managed Threat Detection and Response
Alert Logic
 
PDF
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
Alert Logic
 
PDF
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Priyanka Aash
 
PDF
Protecting Against Web Attacks
Alert Logic
 
PDF
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
Alert Logic
 
PPTX
Cloud security
Jhanvi Dattani
 
PDF
Microsoft Azure Security Infographic
Microsoft Azure
 
PDF
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Alert Logic
 
PPTX
CSS 17: NYC - Building Secure Solutions in AWS
Alert Logic
 
PPTX
Cloud security (domain11 14)
Maganathin Veeraragaloo
 
PDF
CSA SV Threat detection and prediction
Vishwas Manral
 
PDF
Unified Protection for Multi-Cloud Infrastructure
MarketingArrowECS_CZ
 
PPTX
Cloud Security
Giovanni Mazzeo
 
PPT
Cloud security
Tushar Kayande
 
PDF
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 
PPTX
CSS 17: NYC - Protecting your Web Applications
Alert Logic
 
PDF
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
ColorTokens Inc
 
Managed Threat Detection & Response for AWS Applications
Alert Logic
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Alert Logic
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Alert Logic
 
Managed Threat Detection and Response
Alert Logic
 
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
Alert Logic
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Priyanka Aash
 
Protecting Against Web Attacks
Alert Logic
 
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
Alert Logic
 
Cloud security
Jhanvi Dattani
 
Microsoft Azure Security Infographic
Microsoft Azure
 
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Alert Logic
 
CSS 17: NYC - Building Secure Solutions in AWS
Alert Logic
 
Cloud security (domain11 14)
Maganathin Veeraragaloo
 
CSA SV Threat detection and prediction
Vishwas Manral
 
Unified Protection for Multi-Cloud Infrastructure
MarketingArrowECS_CZ
 
Cloud Security
Giovanni Mazzeo
 
Cloud security
Tushar Kayande
 
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 
CSS 17: NYC - Protecting your Web Applications
Alert Logic
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
ColorTokens Inc
 
Ad

Similar to Security for cloud native workloads (20)

PPTX
12 Ways Not to get 'Hacked' your Kubernetes Cluster
Suman Chakraborty
 
PPTX
Hybrid - Seguridad en Contenedores v3.pptx
HansFarroCastillo1
 
PDF
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
DevOps.com
 
PPTX
Security posture improvements for Google Cloud Platform
Runcy Oommen
 
PDF
Container Security Deep Dive & Kubernetes
Aqua Security
 
PDF
Evolution of security strategies in K8s environments- All day devops
Jose Manuel Ortega Candel
 
PPTX
Understanding docker ecosystem and vulnerabilities points
Abdul Khan
 
PDF
Open shift and docker - october,2014
Hojoong Kim
 
PDF
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld
 
PPTX
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
PDF
Orchestrated - multi tenant architecture at scale with serverless
Orchestrated.
 
PPTX
Enabling Production Grade Containerized Applications through Policy Based Inf...
Docker, Inc.
 
PPT
TransitioningToMicroServonDocker_MS
Lana Kalashnyk
 
PDF
Halifax DevOps - Meet-up - July.19 2017
Kyle Bassett
 
PPTX
Multi cloud governance best practices - AWS, Azure, GCP
Faiza Mehar
 
PDF
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
AlgoSec
 
PDF
Cloud security introduction
Calvin Lee
 
PDF
Operational Visibiliy and Analytics - BU Seminar
Canturk Isci
 
PDF
Kubernetes from the Ground Up
Dustin Humphries
 
PPTX
What's New in Docker - February 2017
Patrick Chanezon
 
12 Ways Not to get 'Hacked' your Kubernetes Cluster
Suman Chakraborty
 
Hybrid - Seguridad en Contenedores v3.pptx
HansFarroCastillo1
 
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
DevOps.com
 
Security posture improvements for Google Cloud Platform
Runcy Oommen
 
Container Security Deep Dive & Kubernetes
Aqua Security
 
Evolution of security strategies in K8s environments- All day devops
Jose Manuel Ortega Candel
 
Understanding docker ecosystem and vulnerabilities points
Abdul Khan
 
Open shift and docker - october,2014
Hojoong Kim
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld
 
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
Orchestrated - multi tenant architecture at scale with serverless
Orchestrated.
 
Enabling Production Grade Containerized Applications through Policy Based Inf...
Docker, Inc.
 
TransitioningToMicroServonDocker_MS
Lana Kalashnyk
 
Halifax DevOps - Meet-up - July.19 2017
Kyle Bassett
 
Multi cloud governance best practices - AWS, Azure, GCP
Faiza Mehar
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
AlgoSec
 
Cloud security introduction
Calvin Lee
 
Operational Visibiliy and Analytics - BU Seminar
Canturk Isci
 
Kubernetes from the Ground Up
Dustin Humphries
 
What's New in Docker - February 2017
Patrick Chanezon
 
Ad

More from Runcy Oommen (20)

PPTX
Security hardening enhancements for Kubernetes
Runcy Oommen
 
PPTX
Designing A Time bound resource download URL
Runcy Oommen
 
PPTX
Security enhancements for popular GCP services
Runcy Oommen
 
PPTX
Serverless solution architecture in AWS
Runcy Oommen
 
PPTX
Europe Cloud Summit - Security hardening of public cloud services
Runcy Oommen
 
PPTX
Cloud & GCP 101
Runcy Oommen
 
PDF
Serverless security for multi cloud workloads
Runcy Oommen
 
PDF
Building AWS native serverless website
Runcy Oommen
 
PPTX
Get to know Git
Runcy Oommen
 
PPTX
GCDC Bengaluru - Community Growth Hacking
Runcy Oommen
 
PDF
Earth Engine on Google Cloud Platform (GCP)
Runcy Oommen
 
PPTX
Get your Git on GitHub
Runcy Oommen
 
PPTX
Run C++ as serverless with GCP Cloud Functions
Runcy Oommen
 
PPTX
Effective Tech Community Engagement - Best Practices
Runcy Oommen
 
PPTX
Rajasthan IT Day Hackathon Finals
Runcy Oommen
 
PPTX
Arvind Brands - Hackathon - Solution Idea
Runcy Oommen
 
PPTX
Intro to Virtualization - 10000 feet view
Runcy Oommen
 
PPTX
Docker Introductory workshop
Runcy Oommen
 
PPTX
Accenture Hack Forward - Finals
Runcy Oommen
 
PDF
Unilever Hackathon
Runcy Oommen
 
Security hardening enhancements for Kubernetes
Runcy Oommen
 
Designing A Time bound resource download URL
Runcy Oommen
 
Security enhancements for popular GCP services
Runcy Oommen
 
Serverless solution architecture in AWS
Runcy Oommen
 
Europe Cloud Summit - Security hardening of public cloud services
Runcy Oommen
 
Cloud & GCP 101
Runcy Oommen
 
Serverless security for multi cloud workloads
Runcy Oommen
 
Building AWS native serverless website
Runcy Oommen
 
Get to know Git
Runcy Oommen
 
GCDC Bengaluru - Community Growth Hacking
Runcy Oommen
 
Earth Engine on Google Cloud Platform (GCP)
Runcy Oommen
 
Get your Git on GitHub
Runcy Oommen
 
Run C++ as serverless with GCP Cloud Functions
Runcy Oommen
 
Effective Tech Community Engagement - Best Practices
Runcy Oommen
 
Rajasthan IT Day Hackathon Finals
Runcy Oommen
 
Arvind Brands - Hackathon - Solution Idea
Runcy Oommen
 
Intro to Virtualization - 10000 feet view
Runcy Oommen
 
Docker Introductory workshop
Runcy Oommen
 
Accenture Hack Forward - Finals
Runcy Oommen
 
Unilever Hackathon
Runcy Oommen
 

Recently uploaded (20)

PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Doc9.....................................
SofiaCollazos
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 

Security for cloud native workloads

  • 1. Security for Cloud Native Workloads 22-May-2021 | DevSecOps Conf 2020 Runcy Oommen
  • 2. |In brief| Generic cloud native & cloud security overview Shared responsibility model Microservices security Containers v/s Serverless Securing the container lifecycle Kubernetes security improvements
  • 3. Career  Principal SDE, SONICWALL, 18+ yrs. industry experience primarily in systems, cloud (private/public), security, networking  10x multi-cloud certified (GCP, AWS, Azure, CNCF)  Patent (India) in cloud security around distributed data storage  Interested in serverless, containers and cloud native offerings. Firm believer of a multi-hybrid cloud future Community  Organizer of GDG Cloud, AWS user Group and Cloud Native meetup groups in Bangalore  Regular speaker at domestic and international cloud, tech & security conferences  Multiple hackathon wins in cloud/security topics.  Recognized by Google as a community influencer [~]$ whoami runcyoommen https://runcy.me
  • 4. What does “Cloud Native” mean? A cloud computing approach to build & run scalable apps in modern environments such as public, private and hybrid clouds. Technologies such as containers, microservices, serverless and immutable infrastructure, deployed are elements of this architecture. Reference: https://en.wikipedia.org/wiki/Cloud_native_computin
  • 5. IT infrastructure & landscape has undergone a paradigm shift…
  • 8. So, how exactly should cloud native security differ from traditional network security?
  • 9. Ubiquitous The cloud is always reachable from anywhere, any time, any device Scalable You can add new features and support users without breaking a sweat Integrated Security and other services talk to each other for full visibility Comprehensive The Cloud scans every byte – ingress and egress – including SSL & CDN Intelligent The cloud learns from every user, network and traffic Important facets of cloud Available Capabilities can be guaranteed to remain accessible runcyoommen
  • 10. Cloud Features v/s Security Balances  Agility  Self service  Scale  Automation  Gatekeeper  Standards  Control  Centralized  Pay as you go  Timely alerts
  • 17.  Portability – By abstracting applications from host, it’s easier to run on any platform or cloud  Scalability – Containerized applications holds the ability to handle increasing workloads  Fast Development – Allows developers to change and track changes in the platform’s source code ensuring high productivity  Security – App isolation ensures that separate containers run independently  Continuity – Failure of one will not influence the state of others  Easy Management – Orchestration performs application management, automated installation and workload management runcyoommen
  • 20. How did we get here?
  • 22. The stack of *SECURITY* responsibilities… Sys Admin DevOps Develope r
  • 23. SECURING THE CONTAINER LIFECYCLE BUILD SHIP DEPLOY RUN Image Quality, Exposure Risk Trust, Integrity Assurance Resource, Access Control Process, Network, Secrets VISIBILITY ►Risk posture of the images is not completely understood ►Unclear as to where security should fit in the process ►Containers are not visible with current security tools ►Reliance on open source and external components used
  • 24. SECURITY STARTS IN THE BUNDLE PHASE BUILD SHIP DEPLOY RUN • Make sure base images are secure • Scan for vulnerabilities on the finished product • Maintain configuration standards • Share info between Dev, Ops, Sec
  • 25. ADD ENFORCEMENT OF IMAGE USAGE BUILD SHIP DEPLOY RUN • Deny unknown images or registries • Accept images based on risk • Maintain integrity of images
  • 26. LIMIT ACCESS TO CONTAINER ENGINE BUILD SHIP DEPLOY RUN • Separate automation from human actions • Control parameters that elevate privilege • Permissions on volumes, network etc… • Maintain audit trail with accountable user
  • 27. GRANULAR RUNNING OF CONTAINERS BUILD SHIP DEPLOY RUN • Resource management • Protect sensitive data • Network segmentation • Fine-grained app controls
  • 28. Let’s summarize container security • Prevent unknown images Production Host • Stop user privilege escalation • Stop suspicious processes • Enforce network isolation • Encrypt sensitive vars/params • Swear by automation and tools • Visibility across the environment runcyoomme
  • 29. KUBERNETES SECURITY IMPROVEMENTS Disable Anonymous Authentication Configure Admission Controllers Pod Security Policies Enable Authz with RBAC Network Policies for Segmentation
  • 30. • Disable anonymous authentication Generally two types of users exist: – Normal Users (managed by outside entities like LDAP, AD etc.) – Service Accounts (managed by K8s API with credentials as secrets) Anything else is treated as anonymous request – Given a username system:anonymous and group system:unauthenticated For e.g. with token authentication & anonymous access enabled, a request with an invalid bearer token would receive a 401 error; a request providing no bearer token would be treated as an anonymous request. Recommendation: Disable this mode by passing --anonymous-auth=false option to API server
  • 31. • Configure admission controllers – Intercepts requests to create, delete, modify or connect to proxy – “validating” or “mutating” (able to modify the object they admit) Syntax: Replace what appears after = with name of the admission controller --enable-admission-plugins=NameOfController,NameOfController2 Recommendation: * Enable below admission controllers by default LimitRanger,DefaultStorageClass,DefaultTolerationSeconds,Names paceLifecycle,ServiceAccount,MutatingAdmissionWebhook,Validati ngAdmissionWebhook,Priority,ResourceQuota,PodSecurityPolicy * Enable ValidatingAdmissionWebhook to validate K8s resources during create, update, and delete operations * Ensure AlwaysPullImages is set to make sure private images are only pulled by those who have the credentials.
  • 32. • Disable public access to cluster • Pod security policies – Defined as a cluster level resource that controls security sensitive aspects – Conditions for pod to be admitted in system – Target pod’s service account must be authorized for this policy – Implemented as an optional (but recommended) admission controller – Never expose remote connectivity to your nodecluster – Use a bastion host in your management VPC – Ensure it is peered with the cluster network for connectivity
  • 33. • Enable authorization with RBAC – Method of regulating access to resources based on the roles of individual users – RBAC uses the rbac.authorization.k8s.io API group to drive authz decisions Syntax: Start the API server with the authorization-mode flag for RBAC kube-apiserver --authorization-mode=RBAC Potential Mistakes: – Make sure cluster-admin role is not granted unnecessarily (especially during the transition from legacy ABAC controller to RBAC) – Role aggregation (K8s v1.9), if not carefully reviewed can lead to improper usage – Duplicated role grant may happen; subjects get same access in more than one way – Unused roles to subjects that do not exist (deleted service accounts) can make it difficult to see configurations that do matter.
  • 34. • Network policies for segmentation – Specification of how groups of pods can communicate with each other and other network endpoints – When no network policies are applied, then all connections to and from it are permitted – Notion of “pod isolation” which means that pods are isolated if at least one network policy applies to them – Intricate and difficult to understand for proper usage. Network plugins recommended from Calico, Cilium, Kube-router, Romana and Weave Net
  • 35. Conclusion  Think security early and anticipate for future growth. Honestly, it’s nothing but a mindset!  Focus on logical and organizational structure to engrave it into your environment  Enablement to move fast and break things but protect from themselves  Apply security controls at the layers that make the most sense  Security is no longer about a “layer on top”. Ensure it at every step of the SDLC and throughout the stack
  • 36. Questions | Comments | Discussions runcyoommen https://runcy.me Runcy Oommen