Kubernetes安全求生指南隨便Google就可找到好幾卡車的Kubernetes安全最佳實務/指南.... 6 ©2019 VMware, Inc. Kubernetes安全最佳實務 Kubernetes Security Best Practices ©2019 VMware, Inc. 7 關閉公開存取 (Disable public access) 實施角色型存取權控管 (Implement (Enable audit logging) 跟上最新的 Kubernetes版本 (Keep your Kubernetes version up to date) Kubernetes Security Best Practices Kubernetes安全性的最佳實務指導 資料來源: https://blog.sqreen.com/kubernetes-security-best-practices/ (Worker Node) 5. 政策 (Policies) ©2019 VMware, Inc. 10 Use Cases: Security Architecture Guidance / Replacement for Checklist / Security Training OWASP CSVS – 對Docker容器應用開發/調度平台的控制措施 組織面 基礎架構 容器 調度管理0 码力 | 23 页 | 2.14 MB | 1 年前3
秘钥管理秘钥Turtles all the way down - Securely managing Kubernetes Secretsthe way down Turtles all the way down Alex Tcherniakhovski Security Engineer, Google Cloud Maya Kaczorowski Security PM, Google Cloud @MayaKaczorowski Protecting secrets What’s a secret combination of a safe. If a safe combination is known to an adversary, the strongest safe provides no security against penetration. Similarly, poor key management may easily compromise strong algorithms.” filesystem, as an environment variable, or via Kubernetes API call ● Operations with secrets are audit logged Master kube-apiserver etcd SECRET Kubernetes secrets: 1.7 EncryptionConfig ● Encrypt0 码力 | 52 页 | 2.84 MB | 1 年前3
在大规模Kubernetes集群上实现高SLO的方法ContainerCrashLoopBackOff, FailedPostStartHook, Unhealthy… Trace system Increase of SLO Data Collect Audit log Event The unhealthy node Monitoring Isolation Recover Degrade Data Analysis Failures/Machine End User Storage Analysis Platform Trace Report Weakness The trace system Data Collect: Collect Audit log for the whole cluster. Data analysis: Analyze failure reason if pod is failed. Reason analysis:0 码力 | 11 页 | 4.01 MB | 1 年前3
Kubernetes日志平台建设最佳实践-元乙MaxCompute EMR Interactive Analytics DLA Log Service / Analytics �� Flink Storm ����������� Audit Ingress Mesh Event HPA Kubernetes������ ��� ���� Mesh ���� Stdout �� Event … DaemonSet Sidecar0 码力 | 30 页 | 53.00 MB | 1 年前3
多雲一體就是現在:
GOOGLE CLOUD 的
KUBERNETES
混合雲戰略tested by Google ● Access to Container services on GCP such as Cloud Build, Container Registry, Audit Logging, and more. ● Integration with Istio, Knative, Marketplace Solutions ALPHA IN FALL Run your0 码力 | 32 页 | 2.77 MB | 1 年前3
Putting an Invisible Shield on Kubernetes Secretstokens • ssh keys etc. • Stored in etcd • distributed Key-Value data store • How about their security? • Default K8s setup • etcd contents not encrypted (only base64 encoded) • > K8s 1.7+ • at-rest scheme • DEK & KEK Motivation: K8s Secrets Protection • Performance & latency • Network • Security • DEK in the clear in memory • Secret in the clear in memory • kubeconfig in the clear in memory User access management => raw and extensive! ü Secrets management => crucial! • Financial-grade security [1] KubeCon China 2018: Node Operator: Kubernetes Node Management Made Simple - Joe Chen, Ant Financial0 码力 | 33 页 | 20.81 MB | 1 年前3
用户界面State of the UI_ Leveraging Kubernetes Dashboard and Shaping its Future集成第三方插件 2. Feature parity with kubectl 功能与kubectl保持一致 3. Multi-cluster management 多集群管理 4. Improved security 提高安全性 Top requested changes 1. Third-party plugins or integrations 集成第三方插件 Which third-party 有多重要? https://github.com/kubernetes/dashboard/issues /3256#issuecomment-437199403 4. Improved security “During the week of June 1st, 2018, [researchers] discovered more than 21,000 publicly facing Kubernetes represented more than 78% of all open IP's.” → Lacework: Container Security Research 4. Improved security bit.ly/securing-dashboard Securely running Dashboard is possible! “We operate0 码力 | 41 页 | 5.09 MB | 1 年前3
多租户Kubernetes VM Solutions for Multi-Tenant ApplicationsKubeVirt RancherVM Kata Container Focus : deploy REAL vm (traditional vm app) Focus : container security Virtlet Virtlet is a Kubernetes runtime server which allows you to run VM workloads, based on scale. RancherVM Architecture RancherVM Networking Container Security gVisor NFV? Kata Container The speed of containers, the security of VMs https://github.com/kata-containers Kata Container Architecture0 码力 | 33 页 | 3.34 MB | 1 年前3
Amazon Elastic Kubernetes Service (EKS) 初探秘Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential 责任共担模型 Security in the Cloud Security of the Cloud © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved Inspector AWS KMS AWS Secrets Manager AWS WAF AWS IAM Amazon GuardDuty Amazon Macie AWS Security Hub AWS CloudHSM AWS Certificate Manager AWS CloudTrail host container dependencies code0 码力 | 39 页 | 1.83 MB | 1 年前3
Kubernetes开源书 - 周立gIgnoredDuringExecution: - labelSelector: matchExpressions: - key: security operator: In values: - S1 topologyKey: failure-domain podAffinityTerm: labelSelector: matchExpressions: - key: security operator: In values: - S2 topologyKey: kubernetes preferredDuringSchedulingIgnoredDuringExecution 。Pod Affinity规则表示,只有当相同Zone中的某个Node⾄少有⼀ 个已经运⾏的、具有key=security、value=S1的Label的Pod时,该Pod才能调度到Node上。 (更准确地说,Pod会运⾏ 在这样的Node N上:Node N具有带有 failure-domain.beta.kubernetes0 码力 | 135 页 | 21.02 MB | 1 年前3
共 25 条
- 1
- 2
- 3













