This document is designed to list potential attack vectors and solutions to them.
- Kernel exploits
- Denial-of-service attacks
- Container Breakouts
- Poisoned Images
- Compromising Secrets
- Minimize the attack surface
- Apply the principle of least privilege
- Segregation
- Don’t forget security in DevOps
- Always trust your sources
- Kube-Bench - Uses CIS Benchmark to evaluate your cluster
- Stay up-to-date
- OS + Framework Patching
- Content Trust : Ensure the integrity of images throughout the life cycle / images haven't been tampered with
- Container Image Scanning : Scan all files in container image for vulnerabilities
- Image Availability : Do you care if images are publicly available?
- Open Policy Agent : Only allow pulling from specific container registries
- Enforce least privileges in runtime
- AppArmor + seccomp
- Avoid running container as Root or with Privileges
- Whitelist files and executables allowed to access or run
- AKS + Kured: Add security patches to Host VM
- Log all container administrative user access for auditing
- Monitor container activity and user access
- Monitor container resource activity
- Network Policy Enforcement: Enforce network segmentation on running containers
- Azure Firewall: Limit egress traffic from cluster
- Manage access to the cluster
- Manage access within the cluster
- Web Application Firewall : L7 Protection from cross-site scripting (XSS) attacks, SQL injection attacks, session hijacking and buffer overflows