+ All Categories
Home > Technology > Kubernetes Cluster Wide Security Policy Configuration

Kubernetes Cluster Wide Security Policy Configuration

Date post: 19-Mar-2017
Category:
Upload: bpradipt
View: 132 times
Download: 2 times
Share this document with a friend
6
Kubernetes Pradipta Banerjee @pradipta_kr www.cloudgeekz.com
Transcript
Page 1: Kubernetes Cluster Wide Security Policy Configuration

KubernetesPradipta Banerjee

@pradipta_kr www.cloudgeekz.com

Page 2: Kubernetes Cluster Wide Security Policy Configuration

Kubernetes Components

Page 3: Kubernetes Cluster Wide Security Policy Configuration

Kubernetes Authentication and Authorization

Page 4: Kubernetes Cluster Wide Security Policy Configuration

Container Security Policies

• What ?• Can the container process run as

‘root’ user ?• Can the user run a ‘privileged’

container ?• What ‘capabilities’ should be

allowed for the container ?• …

• How ?• How the cluster admin can enforce

container security ?

• Kubernetes provides Pod Security Policy for enforcing cluster wide security policies.

Page 5: Kubernetes Cluster Wide Security Policy Configuration

Example Policy Don’t allow process(es) inside the container to run as the ‘root’ user

POD should meet the following criteria:• The POD container image(s) should have USER attribute definedOR• The POD YAML file should explicitly specify the non-root USER ID as part of securityContext

noroot.yaml pod.yaml

Page 6: Kubernetes Cluster Wide Security Policy Configuration

References• https://kubernetes.io/docs/user-guide/pod-security-policy/• cloudgeekz.com/1204/docker-cluster-kubernetes-policies.html• https://www.katacoda.com/bpradipt/scenarios/kubernetes-podsecuri

typolicy


Recommended