-
Notifications
You must be signed in to change notification settings - Fork 2.8k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
4bfb7b5
commit 07eafd9
Showing
1 changed file
with
28 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,28 @@ | ||
# Kubernetes Security Journey for DevSecOps Engineers | ||
|
||
As DevSecOps engineers, one of the primary resposibilities is to maintain security of your Kubernetes clusters and the containers. | ||
Here are some of the mandatory things to consider. | ||
|
||
## Secure your API server | ||
The Kubernetes API server is a critical component of the cluster and should be secured with strong authentication and authorization mechanisms. | ||
Use TLS certificates for all communications with the API server. | ||
|
||
## RBAC | ||
Use Role-Based Access Control to define who can access the Kubernetes API and what actions they are allowed to perform. | ||
Use strong authentication methods like multi-factor authentication and enforce password policies. | ||
|
||
## Network Policies | ||
Use network policies to restrict traffic within the cluster and to/from external sources. | ||
Use firewalls and security groups to control traffic to and from the cluster. | ||
|
||
## Encrypt data at rest | ||
Use encryption to protect sensitive data stored in etcd and other components of the cluster. | ||
|
||
## Secure Container Images | ||
Use container images from trusted sources and scan them for vulnerabilities before deployment. | ||
|
||
## Cluster Monitoring | ||
Use tools like Kubernetes Audit Logs and security monitoring solutions to detect and respond to security threats in real-time. | ||
|
||
## Upgrades | ||
Keep the Kubernetes cluster and its components up to date with the latest security patches and updates. |