-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document the security aspects to secure K8s #20
Comments
Roadmap:We will address Kubernetes cluster security a layer at a time a.k.a The 4C's of Cloud Native Security; which are Cloud provider, Clusters, Containers, and Code . Cloud Provider:Follow recommendations by Digital Ocean to securely run a DOKS.
Clusters:Access to the Kubernetes API should be controlled by first authenticating and authorizing distant users (configured at step 1) and wiring them depending on their perspective service accounts .
kubectl create -f - <<EOF
apiVersion: v1
kind: ServiceAccount
metadata:
name: sa1
automountServiceAccountToken: false
EOF later the Pod is run with service account “sa1” assigned to it: kubectl create -f - <<EOF
apiVersion: v1
kind: Pod
metadata:
name: sa1-pod
spec:
serviceAccountName: sa1
containers:
- name: nginx
image: nginx: latest
ports:
- containerPort: 80
EOF Alternatively, disabling the account service mount can be done when creating the pod : kubectl create -f - <<EOF
apiVersion: v1
kind: Pod
metadata:
name: sa1-pod
spec:
serviceAccountName: sa1
autmountServiceAccountoken:false
containers:
- name: nginx
image: nginx: latest
ports:
- containerPort: 80
EOF
Containers:Might be out of the scope of this ticket, but there's some recommendations to follow while building a container:
Finally, signing containers and establishing a system of trust for deployed applications. Code:Access should to be enabled only over TLS |
@TAnas0 @jassem123 @andrewtpham to discuss sometime Friday the points laid out above. Once agreed, @jassem123 can open a PR with the documentation. |
This is a continuation of the K8s documentation on how to best manage.
Use this card to track security documentation on K8s and our infrastructure
The text was updated successfully, but these errors were encountered: