Tapping Native Controls in Kubernetes to Protect Your Cloud-Native Apps

By Rancher Labs - 2020-12-15

Description

As companies adopt container technologies, they face a significant challenge - how do we secure this new attack surface? In this blog we aim to demystify the Kubernetes security threats, showcase best ...

Summary

  • As companies adopt container technologies, they face a significant challenge - how do we secure this new attack surface?
  • Kubernetes has a similar policy, although the file with the keys needs to be secure as well.
  • Linux capabilities The SELinux context of the container Usage of host networking and ports Use of the host filesystem The user and group IDs of the container Keep in mind the zero-trust approach to systems, where capabilities should be set so the container has the minimum functionality required at runtime to function.
  • Conclusion It is challenging to take on Kubernetes security on your own.

 

Topics

  1. Backend (0.28)
  2. Management (0.12)
  3. Security (0.11)

Similar Articles

By Cloud Native Computing Foundation - 2020-12-17

Google’s donation will help further the technical maturity and stability of the Kubernetes project SAN FRANCISCO, Calif. – December 17, 2020 – The Cloud Native…

5 Kubernetes predictions for 2021

By enterprisersproject - 2020-12-22

As Kubernetes enters a new phase of maturity at many enterprises, what’s next? Let's examine five automation issues that matter post-Kubernetes rollout – and advice for teams grappling with them

A Custom

By Kubernetes - 2020-12-21

Author: Chris Seto (Cockroach Labs) As long as you're willing to follow the rules, deploying on Kubernetes and air travel can be quite pleasant. More often than not, things will "just work". However, ...