Book description
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share best-practice configuration to help you harden clusters from possible angles of attack.
This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system.
- Understand where your Kubernetes system is vulnerable with threat modelling techniques
- Focus on pods, from configurations to attacks and defenses
- Secure your cluster and workload traffic
- Define and enforce policy with RBAC, OPA, and Kyverno
- Dive deep into sandboxing and isolation techniques
- Learn how to detect and mitigate supply chain attacks
- Explore filesystems, volumes, and sensitive information at rest
- Discover what can go wrong when running multitenant workloads in a cluster
- Learn what you can do if someone breaks in despite you having controls in place
Publisher resources
Table of contents
- Preface
- 1. Introduction
- 2. Pod-Level Resources
- 3. Container Runtime Isolation
-
4. Applications and Supply Chain
- Defaults
- Threat Model
- The Supply Chain
- CNCF Security Technical Advisory Group
- Captain Hashjack Attacks a Supply Chain
- Container Image Build Supply Chains
- The State of Your Container Supply Chains
- Signing Builds and Metadata
- Infrastructure Supply Chain
- Types of Supply Chain Attack
- Defending Against SUNBURST
- Conclusion
- 5. Networking
- 6. Storage
- 7. Hard Multitenancy
- 8. Policy
- 9. Intrusion Detection
- 10. Organizations
- A. A Pod-Level Attack
- B. Resources
- Index
Product information
- Title: Hacking Kubernetes
- Author(s):
- Release date: October 2021
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781492081739
You might also like
book
Networking and Kubernetes
Kubernetes has become an essential part of the daily work for most system, network, and cluster …
book
Learn Kubernetes Security
Secure your container environment against cyberattacks and deliver robust deployments with this practical guide Key Features …
book
Hacking APIs
An Application Programming Interface (API) is a software connection that allows applications to communicate and share …
book
Cybersecurity Ops with bash
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of …