Skip to content

Latest commit

 

History

History
81 lines (55 loc) · 3.68 KB

security.md

File metadata and controls

81 lines (55 loc) · 3.68 KB

Security

This document is designed to list potential attack vectors and solutions to them.

Container Threat Vectors

  • Kernel exploits
  • Denial-of-service attacks
  • Container Breakouts
  • Poisoned Images
  • Compromising Secrets

Principles to follow

  • Minimize the attack surface
  • Apply the principle of least privilege
  • Segregation
  • Don’t forget security in DevOps
  • Always trust your sources

Practices

Cluster Security

Software Supply Chain

  • Content Trust : Ensure the integrity of images throughout the life cycle / images haven't been tampered with
  • Container Image Scanning : Scan all files in container image for vulnerabilities
  • Image Availability : Do you care if images are publicly available?
  • Open Policy Agent : Only allow pulling from specific container registries

Runtime Security

  • Enforce least privileges in runtime
  • Whitelist files and executables allowed to access or run

VM/Agent Security

Monitoring

  • Log all container administrative user access for auditing
  • Monitor container activity and user access
  • Monitor container resource activity

Network Security

AuthN and AuthZ

Secrets and Configs

Application

  • Web Application Firewall : L7 Protection from cross-site scripting (XSS) attacks, SQL injection attacks, session hijacking and buffer overflows

References and Credits