A simple walkthrough for those who wish to take their kubernetes knowledge to the next level by creating and deploying a hardened, simple kubernetes infrastructure
Introduction • Hand Holding Kubernetes Hardening • Simpler Hardening • TLS Certification Rotation • Linux Kernel Filtering • Pod Security • NetSec • Cluster • Admission Controller • Workload Integrity • Backups • Secrets • Isolated Kernel • Image Pulling
Hardening an application server that was never intended to be hardened (wrapped by private R&D security tooling not made publicly available) is always a challenge. Especially in light of everything else one must consider and engineer around;
Which is why it is worthwhile to view my lecture on the project that became Kubernetes. Design decisions were made of that era’s philosophy. Hence this walkthrough to right the sins that were made.
Interesting manual techniques to harden kubernetes core
Semi-automated techniques to harden kubernetes core
X.509 builds the internal communication assurance and integrity checks between different Kubernete’s services
SECCOMP goes a long way but is difficult to master
Pod Security is the new hotness
Service Mesh, DNS, autodiscovery - oh my!
The root of all governance
The Gatekeeper of Xul
I think, therefore I am because my identity is mathematicaly proven.
You are only as available as your last successful restoration
Touching other people’s underwear
I heard you like kernels so I put a kernel in your kernel
Or why DockerHub had to make money
k8s.haxx.ninja · GitHub @w8mej · Keyoxide John Menerick