首页 > Web开发 > 详细

Summary Checklist for Run-Time Kubernetes Security

时间:2019-04-02 11:51:29      阅读:155      评论:0      收藏:0      [点我收藏+]

Here is a convenient checklist summary of the security protections to review

for securing Kubernetes deployments during run-time. This list does not cover

the build phase vulnerability scanning and registry protection requirements.

PRE-PRODUCTION

? Use namespaces

? Restrict Linux capabilities

? Enable SELinux

? Utilize Seccomp

? Configure Cgroups

? Use R/O Mounts

? Use a minimal Host OS

? Update system patches

? Conduct security auditing and compliance checks with CIS benchmark tests

RUN-TIME

? Enforce isolation by application / service

? Inspect network connections for application attacks

? Monitor containers for suspicious process or file system activity

? Protect worker nodes from host privilege escalations, suspicious processes or

file system activity

? Capture packets for security events

? Quarantine or remediate compromised containers

? Scan containers & hosts for vulnerabilities

? Alert, log, and respond in real-time to security incidents

? Conduct security auditing and compliance checks with CIS benchmark tests

KUBERNETES SYSTEM

? Review all RBACs

? Protect the API Server

? Restrict Kubelet permissions

? Secure external ports

? Whitelist non-authenticated services

? Limit/restrict console access

? Monitor system container connections and processes in production

Summary Checklist for Run-Time Kubernetes Security

原文:https://www.cnblogs.com/dhcn/p/10641498.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!