SlideShare a Scribd company logo
1 of 38
Download to read offline
19/11/2020 - Emmanuelle Demompion
Understand, verify, and act on
the security of your clusters
What’s the plan?
Introduction
Secure your k8s cluster at its root
Security as a coding philosophy
Managing third parties security
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
1
2
3
4
5
6
7
Lock your data
Security cheat sheet
Conclusion
3
From the Cloud to your code
Introduction
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Scaleway
Private
Infrastructure
High-end
dedicated Servers
Public Cloud
Ecosystem
3 specialized brands to cover all cloud and infrastructure needs
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
6
Compute
Storage
NetworkIoT
AI
Steering
Scaleway
ELEMENTS
Kubernetes Kapsule
Slack #k8s - @ben - @jth - @Sh4d1 - @ema
Just a high availability, fully managed, up-to-date
Kubernetes environment
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
TL;DR; of the webinar
Security issues
Everybody should care about
security
Very few really do
Be aware of the most
common issues
Solutions
Certificates
Admission controllers
Pod security policies
Security by design
Responsibilities
The boss
The analyst
The architect
The developer
The user
On a clock?
You don’t have time to go
through the presentation or
you fell asleep during it, go
to the end, there is a
Kubernetes Cheat Sheet
waiting for you… ;)
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion8
How will this webinar go?
On each slide, I will use these images to illustrate who should feel the most concerned about each topic. You are all concerned,
you just might not be the one dealing with it directly.
First Strike: A creature with first strike will deal its
fight damage before a creature it doesn’t.
Trample: Static ability. After attacking, the creature
with Trample can assign the rest of the damage not
taken by the first target to target other creatures.
Creature: Boss
“No one can defeat the decision maker.”
“Scaleway’s mascot rules” - Marc-Etienne Peintre
5 / *
Landwalk: Static ability. The affected creature may
not be obstructed providing the protecting player
settings a land associated with the specified type.
Shroud: Static ability. The impacted permanent or
player cannot be the goal of every means or abilities,
together with your own.
Creature: Analyst
“Data is everything and more.”
“Connections and correlations” - Marc-Etienne Peintre
3 / 2
Lifelink: Fixed capability. Whenever a card with
lifelink deals damage, the controller of this card
additionally gains life corresponding to the amount of
damage dealt.
Banding: When several creatures with banding,
temporally 'band' together, it can become one
creature to either assault or block.
Creature: Developer
“It’s not a bug, it’s a feature!”
“Scaleway’s mascot space cowboy” - Marc-Etienne Peintre
2 / 2
Indestructible: Any permanent which has
indestructible can't be damaged, and cannot perish
as a consequence of deadly harm.
Intimidate: Fixed capability. A creature with intimidate
cannot be blocked, except by artefact creatures and
also by creatures that share a colour with it.
Creature: User
“I’m a leaf on the wind, watch how I soar…”
“The magnificent” - Marc-Etienne Peintre
* / *
Creature: Architect
“You need strong foundations for a building to last.”
“The builder” - Marc-Etienne Peintre
1 / 4
Cover: Static ability. The affected permanent is
granted with the inability becoming dealt damage,
enchanted, blocked, or targeted by any card aided by
the reported high quality.
Vigilance: Static ability. The affected creature does
not touch as soon as declared as an attacker.
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion9
The takeaways I hope you’ll get from this webinar: You know solutions to address security issues, you feel responsible about
security, whatever your job is, and you are willing to accept that cloud-native apps should include security by design.
Terraform Helm CI/CD
K8s
Third parties Your Service
Code & Services
Deployment
Cluster
Your Data
Everything we should take a look at…
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion10
How bad can it really be?
My cluster: 63 issues
A bunch of tutorials, an old Github
project of mine and on-the-shelf
application installed using Helm.
My old unmaintained Github project:
1054 vulnerabilities
Security issues spread
3 %
57 %
40 %
Cluster
Images
Exposures
13 pods without security policies
1 service running without data encryption
6 namespaces without network policies associated
6 docker images with vulnerable packages 1 image including a private key
3 docker images built with ROOT user
1 service exposing software information
1 service using a self signed certificate
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
ok if trusted, mine was not
11
Securing the infrastructure of your cluster itself
Secure your k8s cluster
at its root
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
How a Kubernetes cluster looks
Creature:DeveloperCreature:ArchitectCreature:Boss
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Worker nodes
Namespaces
Pods
Control-Plane
ETCD
13
Certificates
Managing your Kubernetes cluster
yourself
Use automatically generated certificates
(stored on the API-Server) or generate them
yourself.
Protect the location of your certificates.
Think about a process if you need to revoke
your certificates and regenerate new ones.
Using a managed Kubernetes
engine
Certificates are generated and managed by
the cloud provider.
Depending on the provider, the revoking
policy of certificates can be different and
should be part of your choice of provider.
Creature:ArchitectCreature:Boss
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion14
Admission controllers
19/11/2020 - Understand, verify, and act on the
security of your clusters - Emmanuelle Demompion
Control every request reaching the API-Server1
2
3
Creature:DeveloperCreature:Architect
Limit creation, deletion, modification, or
connection rights
Define the behaviour of every Kubernetes object
running on your cluster
Set security strategies on pods or containers
4
15
Admission controllers
LimitRanger
• Any incoming request should not violate
the Namespace limit ranges constraints.
• Limit Ranges objects enforce min and max
resources, storage, requests, for k8s objects
in a Namespace (Pod, Container,
PersistentVolumeClaim…)
ServiceAccount
• Automation implementation for
ServiceAccounts.
• Mandatory if you are using ServiceAccount
objects in your cluster (to manage different
users accesses to your cluster)
NamespaceLifeCycle
• New objects cannot be created in a
terminating namespace.
• Requests on a non-existing namespace are
rejected.
• Prevents deletion of system reserved
namespaces (default, kube-system, kube-
public).
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
DefaultStorageClass
• Observes the creation of
PersistentVolumeClaim objects which does
not explicitly provide the storage class to
use.
• This is usually set by default on managed
Kubernetes engine to use the provider's
Block storage volumes (bssd)
Creature:DeveloperCreature:Architect
16
Admission controllers
AlwaysPullImages
Every new Pod will have its pull policy set to
“Always”.
• Valid credentials are always required.
• Images will always be pulled before
starting a container.
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
NodeRestriction
• Limits the Node and Pod objects a kubelet
can modify.
• Kubelets must use credentials in the
system:nodes group with a specific
username.
• Ensures kubelets have the minimal set of
permissions required to operate correctly
Creature:DeveloperCreature:Architect
ResourceQuota
• Ensures that incoming requests do not
violate constraints listed in a namespace’s
ResourceQuota object.
• Mandatory if you use ResourceQuota
objects on your namespaces.
PodSecurityPolicy
• Determines if the creation or modification
of a pod should be admitted.
• This admission controller should be set to
allow usage of Pod Security Policies (more
details later).
17
Network policies
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Creature:DeveloperCreature:Architect
Worker nodes
Namespaces
Pods
By default, pods are non-isolated and accept
traffic from any source.
By setting a NetworkPolicy that selects pods,
they become isolated.
Network policies are additive. The network
policy applied on a pod is the intersection of
all applicable policies egress/ingress rules.
Network policies require a CNI supporting
them. Worker nodes
Namespace
Pods Pods
NetworkPolicy1
NetworkPolicy2
NetworkPolicy1
Namespace
18
Pod security policies
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Creature:DeveloperCreature:ArchitectCreature:Analyst
19
Pod security policies allow you to define rules in order to accept or reject the creation
of pods.
This enables the cluster administrators to decide what should run, and what shouldn't,
in the cluster.
For instance, they could decide to deny all pods that are running as root or that runs in
privileged mode.
Role-Based Access Control
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Creature:DeveloperCreature:ArchitectCreature:Analyst
A standard authorization mode that can easily be used within a Kubernetes cluster is
RBAC, by defining a Role or a ClusterRole.
Once Roles are defined, they can be bound by defining a RoleBinding (or
ClusterRoleBinding) and assigned specific ServiceAccounts.
Accesses can be defined by user or by groups of users.
20
Include security concerns in your cloud native
application by design
Security as a coding
philosophy
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Can we code now?
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Creature:DeveloperCreature:Architect
No!
Your cluster is safer now that you defined restrictions and rules within the cluster itself,
but what about the accesses from outside that you definitely need?
I am talking here about your CI/CD, which should have dedicated accesses to the
Container Registry, and to your namespaces.
One pipeline does not need access to the entire cluster, but only to a dedicated part of
it, with a dedicated user defined.
22
Now that your CI/CD is set, you may code :)
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Creature:DeveloperCreature:Architect
It may feel like there are a lot of restrictions going on here, but restriction means
security.
And by designing a production environment with all the necessary security constraints,
the value you provide your customers and end users with your services and
applications will only be greater.
On the development side, there is also the topic of packages vulnerabilities. It may be
useful to ask ourselves, on a regular basis, a few simple questions:
• Are our lists of required packages/libraries up-to-date?
• Do we force a specific version of each package, and how often do we upgrade to the
newest version?
• If one of our dependancies becomes deprecated, should we invest development time
to replacing it so we can keep upgrading our packages? Or should we keep it, no
matter the security risk, and freeze our package version from this point?
23
Security as a coding philosophy
Security should not be seen as a
constraint, but as an opportunity to
learn, improve, and we should be
willing to do it by default.
It will never be a waste of time.
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion24
Managing third parties
security
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Tl;dr; Being on the shelf does not make it safe
Third parties: do you really know what you use?
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Creature:DeveloperCreature:ArchitectCreature:AnalystCreature:Boss
We need third parties because we cannot nor do we want to reinvent the
wheel.
On-the-shelf services and applications allows us to go faster, open source or
on-premise, businesses use third parties for the purpose they serve:
monitoring, logging, database, caching, analytics, and much more.
Those services, like all others, have been coded by humans, and they are not
immune to vulnerabilities.
26
Third parties: do you really know what you use?
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Creature:DeveloperCreature:ArchitectCreature:AnalystCreature:Boss
Using a container on the shelf might have been built by ROOT user, making it
accessible for anyone, including an attacker who got into your production
system if it is not secured enough.
Those thirds parties must not be forgotten while defining security policies
(pods and network), namespace isolation, and user access rights.
Is the security level of an “on-the-shelf service" a criteria when designing your
architecture and software?
27
How to put your data in a safe
Lock your data
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Your data
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Creature:UserCreature:DeveloperCreature:ArchitectCreature:AnalystCreature:Boss
Users data
• Can be stored the same way as your software data, but
contain valuable, critical and personal information
about your customers.
• A leak of your users' data can kill your business.
Software data
• Often stored in a managed database where its security,
redundancy, and availability is ensured by the cloud
provider.
• Sometimes managed on a dedicated server(s),
implying managing the security of the server(s), as well
as the redundancy.
Analytics data
• Statistics, metrics, sensors, valuable data that can be
treated and in multiple ways, from simple statistics to
transformation pipelines and even machine learning
algorithms.
• These data can be the added value you have
compared to your competitors, and they often require
dedicated storage because of their volume, format,
and specific querying requirements.
29
Access restriction, encryption
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Creature:UserCreature:DeveloperCreature:ArchitectCreature:Analyst
Kubernetes and data storage
• Kubernetes is often described as stateless, meaning
that it is not meant to host persistent data directly on
the nodes, which is logical once we consider the node
auto-healing and node autoscaling features.
• Though, data storage is possible in a Kubernetes
cluster, using persistent volumes, such as Block Storage.
• Even if running a database in a Kubernetes cluster is
not recommended, it is possible and quite easy to do
so.
• Persistent volumes can be protected by restricting their
access right solely to the pod to which they are
connected.
• Data stored in persistent volumes can also be
encrypted if it is supported by the CSI of the cloud
provider you use.
30
Your customer’s data: laws are coming
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Creature:ArchitectCreature:AnalystCreature:Boss
Data under protection
• GDPR: General Data Protection Regulation (Europe)
• LGPD: Lei Geral de Proteção de Dados Pessoais (Brazil)
Customers, users and people are now increasingly protected by laws like the GDPR.
These laws state that personal data, such as web browsing information, social information, actions tracked on a website
or software... are the property of the user, and that, at any time, they have to be deleted upon the user’s demand.
This request has a huge effect on Software and data pipelines, because not only is it a specific feature, but if your
software is communicating this data to another software, the deletion order should follow.
This also asks the question of anonymised data for machine learning or statistics. For now, a machine learning model
based on anonymised data does not have to be re-trained without the removed data, but if the law evolves, it could be
the case and have a drastic impact on some software and businesses.
The best thing to do is to ensure that this data is safe, anonymous, and legitimate. Only keep what you need, and justify
what it is used for.
31
Tl;dr; if you did not listen nor read, at least take
this home with you
Security cheat sheet
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Security Cheat Sheet
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Choose wisely
• Your cloud provider: what is its revoke certificate strategy?
• Your third parties: are they secured, vulnerable, mandatory?
Design before code
• The production infrastructure of your software will define the
roles, users, and best practices to code with serenity.
• Learn and be curious about vulnerabilities.
• Know your priorities when it comes to security.
• Who can access what, and should they be able to?
Start fresh
• Set your admission controllers (at least):
NamespaceLifeCycle, LimitRanger, ServiceAccount,
DefaultStorageClass, PodSecurityPolicy, ResourceQuota.
• Define Pod security policies to define rules for pods' creation.
• Define Network security policies to isolate pods within your
cluster.
Be responsible
• A production environment is everyone's responsibility
• You are in the same boat, don't let other people row when
things get complicated
33
An engaged team makes for a protected customer
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
FirstStrike:Acreaturewithfirststrikewilldealits
fightdamagebeforeacreatureitdoesn’t.
Trample:Staticability.Afterattacking,thecreature
withTramplecanassigntherestofthedamagenot
takenbythefirsttargettotargetothercreatures.
Creature:Boss
“Noonecandefeatthedecisionmaker.”
“Scaleway’smascotrules”-Marc-EtiennePeintre
5/*
Landwalk:Staticability.Theaffectedcreaturemay
notbeobstructedprovidingtheprotectingplayer
settingsalandassociatedwiththespecifiedtype.
Shroud:Staticability.Theimpactedpermanentor
playercannotbethegoalofeverymeansorabilities,
togetherwithyourown.
Creature:Analyst
“Dataiseverythingandmore.”
“Connectionsandcorrelations”-Marc-EtiennePeintre
3/2
Lifelink:Fixedcapability.Wheneveracardwith
lifelinkdealsdamage,thecontrollerofthiscard
additionallygainslifecorrespondingtotheamountof
damagedealt.
Banding:Whenseveralcreatureswithbanding,
temporally'band'together,itcanbecomeone
creaturetoeitherassaultorblock.
Creature:Developer
“It’snotabug,it’safeature!”
“Scaleway’smascotspacecowboy”-Marc-EtiennePeintre
2/2
Indestructible: Any permanent which has
indestructible can't be damaged, and cannot perish
as a consequence of deadly harm.
Intimidate: Fixed capability. A creature with intimidate
cannot be blocked, except by artefact creatures and
also by creatures that share a colour with it.
Creature: User
“I’m a leaf on the wind, watch how I soar…”
“The magnificent” - Marc-Etienne Peintre
* / *
Creature:Architect
“Youneedstrongfoundationsforabuildingtolast.”
“Thebuilder”-Marc-EtiennePeintre
1/4
Cover:Staticability.Theaffectedpermanentis
grantedwiththeinabilitybecomingdealtdamage,
enchanted,blocked,ortargetedbyanycardaidedby
thereportedhighquality.
Vigilance:Staticability.Theaffectedcreaturedoes
nottouchassoonasdeclaredasanattacker.
34
Better safe than sorry
KAPSLOCKED
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
Conclusion
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
You should be safer than 50% of other production systems.
Good enough? That’s for you to decide.
Have a look at the official Kubernetes documentation about the different topics related to this presentation
• Certificates
• Admission Controllers
• Service Account
• Network Policies
• Pod Security Policy
Feel free to join us on slack (https://slack.scaleway.com/) #k8s.
Our Kubernetes community now has more than 650 members.
36
Conclusion
“Care, but don’t overthink it”
19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion37
#k8s slack channel
@ema - @ben - @jth - @Sh4d1
Merci !

More Related Content

What's hot

Introduction to Fog
Introduction to FogIntroduction to Fog
Introduction to FogCisco DevNet
 
See Your OpenStack Network Like Never Before
See Your OpenStack Network Like Never BeforeSee Your OpenStack Network Like Never Before
See Your OpenStack Network Like Never BeforePLUMgrid
 
Enabling application portability with the greatest of ease!
Enabling application portability with the greatest of ease!Enabling application portability with the greatest of ease!
Enabling application portability with the greatest of ease!Ken Owens
 
Bringing Cloud Native Innovation to the Enterprise
Bringing Cloud Native Innovation to the EnterpriseBringing Cloud Native Innovation to the Enterprise
Bringing Cloud Native Innovation to the EnterpriseNicolas (Nick) Barcet
 
IoX - tech-intro-for-paris-hackathon
IoX - tech-intro-for-paris-hackathonIoX - tech-intro-for-paris-hackathon
IoX - tech-intro-for-paris-hackathonCisco DevNet
 
Extreme IoT Games
Extreme IoT GamesExtreme IoT Games
Extreme IoT GamesMike Kavis
 
Edge computing in practice using IoT, Tensorflow and Google Cloud
Edge computing in practice using IoT, Tensorflow and Google CloudEdge computing in practice using IoT, Tensorflow and Google Cloud
Edge computing in practice using IoT, Tensorflow and Google CloudAlvaro Viebrantz
 
Effective IoT System on Openstack
Effective IoT System on OpenstackEffective IoT System on Openstack
Effective IoT System on OpenstackTakashi Kajinami
 
eNovance Make Your Cloud
eNovance Make Your CloudeNovance Make Your Cloud
eNovance Make Your CloudeNovance
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoTIan Skerrett
 
Cloud Automation with ProActive
Cloud Automation with ProActiveCloud Automation with ProActive
Cloud Automation with ProActiveBrian AMEDRO
 
"Processor Options for Edge Inference: Options and Trade-offs," a Presentatio...
"Processor Options for Edge Inference: Options and Trade-offs," a Presentatio..."Processor Options for Edge Inference: Options and Trade-offs," a Presentatio...
"Processor Options for Edge Inference: Options and Trade-offs," a Presentatio...Edge AI and Vision Alliance
 
IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel Bessie Wang
 
Scaling Challenges in Edge AI
Scaling Challenges in Edge AI Scaling Challenges in Edge AI
Scaling Challenges in Edge AI Alphonse Raj David
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionMarketingArrowECS_CZ
 
IoT Seminar (Oct. 2016) Pilgrim Beart - DevicePilot & Duncan Purves - Connect...
IoT Seminar (Oct. 2016) Pilgrim Beart - DevicePilot & Duncan Purves - Connect...IoT Seminar (Oct. 2016) Pilgrim Beart - DevicePilot & Duncan Purves - Connect...
IoT Seminar (Oct. 2016) Pilgrim Beart - DevicePilot & Duncan Purves - Connect...Open Mobile Alliance
 
Blueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductBlueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductGuy Vinograd ☁
 
Design, Innovate, Digitize. Building Skills to Solve Future Problems
Design, Innovate, Digitize. Building Skills to Solve Future ProblemsDesign, Innovate, Digitize. Building Skills to Solve Future Problems
Design, Innovate, Digitize. Building Skills to Solve Future ProblemsCisco DevNet
 

What's hot (20)

Introduction to Fog
Introduction to FogIntroduction to Fog
Introduction to Fog
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
See Your OpenStack Network Like Never Before
See Your OpenStack Network Like Never BeforeSee Your OpenStack Network Like Never Before
See Your OpenStack Network Like Never Before
 
Enabling application portability with the greatest of ease!
Enabling application portability with the greatest of ease!Enabling application portability with the greatest of ease!
Enabling application portability with the greatest of ease!
 
Bringing Cloud Native Innovation to the Enterprise
Bringing Cloud Native Innovation to the EnterpriseBringing Cloud Native Innovation to the Enterprise
Bringing Cloud Native Innovation to the Enterprise
 
IoX - tech-intro-for-paris-hackathon
IoX - tech-intro-for-paris-hackathonIoX - tech-intro-for-paris-hackathon
IoX - tech-intro-for-paris-hackathon
 
Extreme IoT Games
Extreme IoT GamesExtreme IoT Games
Extreme IoT Games
 
Edge computing in practice using IoT, Tensorflow and Google Cloud
Edge computing in practice using IoT, Tensorflow and Google CloudEdge computing in practice using IoT, Tensorflow and Google Cloud
Edge computing in practice using IoT, Tensorflow and Google Cloud
 
Effective IoT System on Openstack
Effective IoT System on OpenstackEffective IoT System on Openstack
Effective IoT System on Openstack
 
eNovance Make Your Cloud
eNovance Make Your CloudeNovance Make Your Cloud
eNovance Make Your Cloud
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoT
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
 
Cloud Automation with ProActive
Cloud Automation with ProActiveCloud Automation with ProActive
Cloud Automation with ProActive
 
"Processor Options for Edge Inference: Options and Trade-offs," a Presentatio...
"Processor Options for Edge Inference: Options and Trade-offs," a Presentatio..."Processor Options for Edge Inference: Options and Trade-offs," a Presentatio...
"Processor Options for Edge Inference: Options and Trade-offs," a Presentatio...
 
IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel
 
Scaling Challenges in Edge AI
Scaling Challenges in Edge AI Scaling Challenges in Edge AI
Scaling Challenges in Edge AI
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
 
IoT Seminar (Oct. 2016) Pilgrim Beart - DevicePilot & Duncan Purves - Connect...
IoT Seminar (Oct. 2016) Pilgrim Beart - DevicePilot & Duncan Purves - Connect...IoT Seminar (Oct. 2016) Pilgrim Beart - DevicePilot & Duncan Purves - Connect...
IoT Seminar (Oct. 2016) Pilgrim Beart - DevicePilot & Duncan Purves - Connect...
 
Blueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductBlueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT Product
 
Design, Innovate, Digitize. Building Skills to Solve Future Problems
Design, Innovate, Digitize. Building Skills to Solve Future ProblemsDesign, Innovate, Digitize. Building Skills to Solve Future Problems
Design, Innovate, Digitize. Building Skills to Solve Future Problems
 

Similar to Understand, verify, and act on the security of your Kubernetes clusters - Scaleway's expertise

How to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
 
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...DevClub_lv
 
K8 Meetup_ K8s secrets management best practices (Git Guardian).pdf
K8 Meetup_ K8s secrets management best practices (Git Guardian).pdfK8 Meetup_ K8s secrets management best practices (Git Guardian).pdf
K8 Meetup_ K8s secrets management best practices (Git Guardian).pdfMichaelOLeary82
 
The Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on KubernetesThe Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on KubernetesJacopo Nardiello
 
Open source security tools for Kubernetes.
Open source security tools for Kubernetes.Open source security tools for Kubernetes.
Open source security tools for Kubernetes.Michael Ducy
 
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Kim Hammar
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
Applied Security for Containers, OW2con'18, June 7-8, 2018, ParisApplied Security for Containers, OW2con'18, June 7-8, 2018, Paris
Applied Security for Containers, OW2con'18, June 7-8, 2018, ParisOW2
 
Learning Optimal Intrusion Responses via Decomposition
Learning Optimal Intrusion Responses via DecompositionLearning Optimal Intrusion Responses via Decomposition
Learning Optimal Intrusion Responses via DecompositionKim Hammar
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2ShapeBlue
 
Best Practices To Secure Kubernetes Cluster
Best Practices To Secure Kubernetes ClusterBest Practices To Secure Kubernetes Cluster
Best Practices To Secure Kubernetes ClusterUrolime Technologies
 
Kubernetes and container security
Kubernetes and container securityKubernetes and container security
Kubernetes and container securityVolodymyr Shynkar
 
Build your first DApp using Substrate Framework - Part I
Build your first DApp using Substrate Framework - Part IBuild your first DApp using Substrate Framework - Part I
Build your first DApp using Substrate Framework - Part IKnoldus Inc.
 
Digital Twins for Security Automation
Digital Twins for Security AutomationDigital Twins for Security Automation
Digital Twins for Security AutomationKim Hammar
 
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Kim Hammar
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
Security Patterns for Microservice Architectures
Security Patterns for Microservice ArchitecturesSecurity Patterns for Microservice Architectures
Security Patterns for Microservice ArchitecturesVMware Tanzu
 
Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020Matt Raible
 

Similar to Understand, verify, and act on the security of your Kubernetes clusters - Scaleway's expertise (20)

How to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
 
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...
 
Become a Cloud Security Ninja
Become a Cloud Security NinjaBecome a Cloud Security Ninja
Become a Cloud Security Ninja
 
K8 Meetup_ K8s secrets management best practices (Git Guardian).pdf
K8 Meetup_ K8s secrets management best practices (Git Guardian).pdfK8 Meetup_ K8s secrets management best practices (Git Guardian).pdf
K8 Meetup_ K8s secrets management best practices (Git Guardian).pdf
 
The Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on KubernetesThe Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on Kubernetes
 
Open source security tools for Kubernetes.
Open source security tools for Kubernetes.Open source security tools for Kubernetes.
Open source security tools for Kubernetes.
 
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
Applied Security for Containers, OW2con'18, June 7-8, 2018, ParisApplied Security for Containers, OW2con'18, June 7-8, 2018, Paris
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
 
Learning Optimal Intrusion Responses via Decomposition
Learning Optimal Intrusion Responses via DecompositionLearning Optimal Intrusion Responses via Decomposition
Learning Optimal Intrusion Responses via Decomposition
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
 
Best Practices To Secure Kubernetes Cluster
Best Practices To Secure Kubernetes ClusterBest Practices To Secure Kubernetes Cluster
Best Practices To Secure Kubernetes Cluster
 
Kubernetes and container security
Kubernetes and container securityKubernetes and container security
Kubernetes and container security
 
Build your first DApp using Substrate Framework - Part I
Build your first DApp using Substrate Framework - Part IBuild your first DApp using Substrate Framework - Part I
Build your first DApp using Substrate Framework - Part I
 
Digital Twins for Security Automation
Digital Twins for Security AutomationDigital Twins for Security Automation
Digital Twins for Security Automation
 
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Security Patterns for Microservice Architectures
Security Patterns for Microservice ArchitecturesSecurity Patterns for Microservice Architectures
Security Patterns for Microservice Architectures
 
Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020
 

More from Scaleway

Éditeurs d'applications mobiles : augmentez la résolution des photos de vos c...
Éditeurs d'applications mobiles : augmentez la résolution des photos de vos c...Éditeurs d'applications mobiles : augmentez la résolution des photos de vos c...
Éditeurs d'applications mobiles : augmentez la résolution des photos de vos c...Scaleway
 
6 winning strategies for agil SaaS editors
6 winning strategies for agil SaaS editors6 winning strategies for agil SaaS editors
6 winning strategies for agil SaaS editorsScaleway
 
Webinar - Relying on Bare Metal to manage your workloads
Webinar - Relying on Bare Metal to manage your workloadsWebinar - Relying on Bare Metal to manage your workloads
Webinar - Relying on Bare Metal to manage your workloadsScaleway
 
Webinaire du 09/04/20 - S'appuyer sur du Bare Metal pour gérer ses pics de ch...
Webinaire du 09/04/20 - S'appuyer sur du Bare Metal pour gérer ses pics de ch...Webinaire du 09/04/20 - S'appuyer sur du Bare Metal pour gérer ses pics de ch...
Webinaire du 09/04/20 - S'appuyer sur du Bare Metal pour gérer ses pics de ch...Scaleway
 
Scaleway Approach to VXLAN EVPN Fabric
Scaleway Approach to VXLAN EVPN FabricScaleway Approach to VXLAN EVPN Fabric
Scaleway Approach to VXLAN EVPN FabricScaleway
 
Workshop IoT Hub : Pilotez une ampoule connectée
Workshop IoT Hub : Pilotez une ampoule connectéeWorkshop IoT Hub : Pilotez une ampoule connectée
Workshop IoT Hub : Pilotez une ampoule connectéeScaleway
 
Why and how we proxy our IoT broker connections
 Why and how we proxy our IoT broker connections Why and how we proxy our IoT broker connections
Why and how we proxy our IoT broker connectionsScaleway
 
From local servers up to Kubernetes in the cloud
From local servers up to Kubernetes in the cloudFrom local servers up to Kubernetes in the cloud
From local servers up to Kubernetes in the cloudScaleway
 
L’évolution des serveurs dédiés vers le Bare Metal et les instances : comm...
L’évolution des serveurs dédiés vers le Bare Metal et les instances : comm...L’évolution des serveurs dédiés vers le Bare Metal et les instances : comm...
L’évolution des serveurs dédiés vers le Bare Metal et les instances : comm...Scaleway
 
L’IA, booster de votre activité : principes, usages & idéation
L’IA, booster de votre activité : principes, usages & idéationL’IA, booster de votre activité : principes, usages & idéation
L’IA, booster de votre activité : principes, usages & idéationScaleway
 
Comment automatiser le déploiement de sa plateforme sur des infrastructures ...
Comment automatiser le déploiement de sa plateforme sur des infrastructures ...Comment automatiser le déploiement de sa plateforme sur des infrastructures ...
Comment automatiser le déploiement de sa plateforme sur des infrastructures ...Scaleway
 
Serverless
ServerlessServerless
ServerlessScaleway
 
Migrating the Online’s console with Docker
Migrating the Online’s console with DockerMigrating the Online’s console with Docker
Migrating the Online’s console with DockerScaleway
 
Routage à grande échelle des requêtes via RabbitMQ
Routage à grande échelle des requêtes via RabbitMQRoutage à grande échelle des requêtes via RabbitMQ
Routage à grande échelle des requêtes via RabbitMQScaleway
 
Instances Behind the Scene: What happen when you click on «create a new insta...
Instances Behind the Scene: What happen when you click on «create a new insta...Instances Behind the Scene: What happen when you click on «create a new insta...
Instances Behind the Scene: What happen when you click on «create a new insta...Scaleway
 
Demystifying IoT : Bringing the cloud to connected devices with IoT Station
Demystifying IoT : Bringing the cloud to connected devices with IoT StationDemystifying IoT : Bringing the cloud to connected devices with IoT Station
Demystifying IoT : Bringing the cloud to connected devices with IoT StationScaleway
 
L’odyssée d’une requête HTTP chez Scaleway
L’odyssée d’une requête HTTP chez ScalewayL’odyssée d’une requête HTTP chez Scaleway
L’odyssée d’une requête HTTP chez ScalewayScaleway
 
Network & Filesystem: Doing less cross rings memory copy
Network & Filesystem: Doing less cross rings memory copyNetwork & Filesystem: Doing less cross rings memory copy
Network & Filesystem: Doing less cross rings memory copyScaleway
 
Fraud detection with Machine Learning
Fraud detection with Machine LearningFraud detection with Machine Learning
Fraud detection with Machine LearningScaleway
 
Kubernetes & CI/CD
Kubernetes & CI/CDKubernetes & CI/CD
Kubernetes & CI/CDScaleway
 

More from Scaleway (20)

Éditeurs d'applications mobiles : augmentez la résolution des photos de vos c...
Éditeurs d'applications mobiles : augmentez la résolution des photos de vos c...Éditeurs d'applications mobiles : augmentez la résolution des photos de vos c...
Éditeurs d'applications mobiles : augmentez la résolution des photos de vos c...
 
6 winning strategies for agil SaaS editors
6 winning strategies for agil SaaS editors6 winning strategies for agil SaaS editors
6 winning strategies for agil SaaS editors
 
Webinar - Relying on Bare Metal to manage your workloads
Webinar - Relying on Bare Metal to manage your workloadsWebinar - Relying on Bare Metal to manage your workloads
Webinar - Relying on Bare Metal to manage your workloads
 
Webinaire du 09/04/20 - S'appuyer sur du Bare Metal pour gérer ses pics de ch...
Webinaire du 09/04/20 - S'appuyer sur du Bare Metal pour gérer ses pics de ch...Webinaire du 09/04/20 - S'appuyer sur du Bare Metal pour gérer ses pics de ch...
Webinaire du 09/04/20 - S'appuyer sur du Bare Metal pour gérer ses pics de ch...
 
Scaleway Approach to VXLAN EVPN Fabric
Scaleway Approach to VXLAN EVPN FabricScaleway Approach to VXLAN EVPN Fabric
Scaleway Approach to VXLAN EVPN Fabric
 
Workshop IoT Hub : Pilotez une ampoule connectée
Workshop IoT Hub : Pilotez une ampoule connectéeWorkshop IoT Hub : Pilotez une ampoule connectée
Workshop IoT Hub : Pilotez une ampoule connectée
 
Why and how we proxy our IoT broker connections
 Why and how we proxy our IoT broker connections Why and how we proxy our IoT broker connections
Why and how we proxy our IoT broker connections
 
From local servers up to Kubernetes in the cloud
From local servers up to Kubernetes in the cloudFrom local servers up to Kubernetes in the cloud
From local servers up to Kubernetes in the cloud
 
L’évolution des serveurs dédiés vers le Bare Metal et les instances : comm...
L’évolution des serveurs dédiés vers le Bare Metal et les instances : comm...L’évolution des serveurs dédiés vers le Bare Metal et les instances : comm...
L’évolution des serveurs dédiés vers le Bare Metal et les instances : comm...
 
L’IA, booster de votre activité : principes, usages & idéation
L’IA, booster de votre activité : principes, usages & idéationL’IA, booster de votre activité : principes, usages & idéation
L’IA, booster de votre activité : principes, usages & idéation
 
Comment automatiser le déploiement de sa plateforme sur des infrastructures ...
Comment automatiser le déploiement de sa plateforme sur des infrastructures ...Comment automatiser le déploiement de sa plateforme sur des infrastructures ...
Comment automatiser le déploiement de sa plateforme sur des infrastructures ...
 
Serverless
ServerlessServerless
Serverless
 
Migrating the Online’s console with Docker
Migrating the Online’s console with DockerMigrating the Online’s console with Docker
Migrating the Online’s console with Docker
 
Routage à grande échelle des requêtes via RabbitMQ
Routage à grande échelle des requêtes via RabbitMQRoutage à grande échelle des requêtes via RabbitMQ
Routage à grande échelle des requêtes via RabbitMQ
 
Instances Behind the Scene: What happen when you click on «create a new insta...
Instances Behind the Scene: What happen when you click on «create a new insta...Instances Behind the Scene: What happen when you click on «create a new insta...
Instances Behind the Scene: What happen when you click on «create a new insta...
 
Demystifying IoT : Bringing the cloud to connected devices with IoT Station
Demystifying IoT : Bringing the cloud to connected devices with IoT StationDemystifying IoT : Bringing the cloud to connected devices with IoT Station
Demystifying IoT : Bringing the cloud to connected devices with IoT Station
 
L’odyssée d’une requête HTTP chez Scaleway
L’odyssée d’une requête HTTP chez ScalewayL’odyssée d’une requête HTTP chez Scaleway
L’odyssée d’une requête HTTP chez Scaleway
 
Network & Filesystem: Doing less cross rings memory copy
Network & Filesystem: Doing less cross rings memory copyNetwork & Filesystem: Doing less cross rings memory copy
Network & Filesystem: Doing less cross rings memory copy
 
Fraud detection with Machine Learning
Fraud detection with Machine LearningFraud detection with Machine Learning
Fraud detection with Machine Learning
 
Kubernetes & CI/CD
Kubernetes & CI/CDKubernetes & CI/CD
Kubernetes & CI/CD
 

Recently uploaded

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Understand, verify, and act on the security of your Kubernetes clusters - Scaleway's expertise

  • 1.
  • 2. 19/11/2020 - Emmanuelle Demompion Understand, verify, and act on the security of your clusters
  • 3. What’s the plan? Introduction Secure your k8s cluster at its root Security as a coding philosophy Managing third parties security 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion 1 2 3 4 5 6 7 Lock your data Security cheat sheet Conclusion 3
  • 4. From the Cloud to your code Introduction 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
  • 5. Scaleway Private Infrastructure High-end dedicated Servers Public Cloud Ecosystem 3 specialized brands to cover all cloud and infrastructure needs 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
  • 6. 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion 6 Compute Storage NetworkIoT AI Steering Scaleway ELEMENTS
  • 7. Kubernetes Kapsule Slack #k8s - @ben - @jth - @Sh4d1 - @ema Just a high availability, fully managed, up-to-date Kubernetes environment 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
  • 8. TL;DR; of the webinar Security issues Everybody should care about security Very few really do Be aware of the most common issues Solutions Certificates Admission controllers Pod security policies Security by design Responsibilities The boss The analyst The architect The developer The user On a clock? You don’t have time to go through the presentation or you fell asleep during it, go to the end, there is a Kubernetes Cheat Sheet waiting for you… ;) 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion8
  • 9. How will this webinar go? On each slide, I will use these images to illustrate who should feel the most concerned about each topic. You are all concerned, you just might not be the one dealing with it directly. First Strike: A creature with first strike will deal its fight damage before a creature it doesn’t. Trample: Static ability. After attacking, the creature with Trample can assign the rest of the damage not taken by the first target to target other creatures. Creature: Boss “No one can defeat the decision maker.” “Scaleway’s mascot rules” - Marc-Etienne Peintre 5 / * Landwalk: Static ability. The affected creature may not be obstructed providing the protecting player settings a land associated with the specified type. Shroud: Static ability. The impacted permanent or player cannot be the goal of every means or abilities, together with your own. Creature: Analyst “Data is everything and more.” “Connections and correlations” - Marc-Etienne Peintre 3 / 2 Lifelink: Fixed capability. Whenever a card with lifelink deals damage, the controller of this card additionally gains life corresponding to the amount of damage dealt. Banding: When several creatures with banding, temporally 'band' together, it can become one creature to either assault or block. Creature: Developer “It’s not a bug, it’s a feature!” “Scaleway’s mascot space cowboy” - Marc-Etienne Peintre 2 / 2 Indestructible: Any permanent which has indestructible can't be damaged, and cannot perish as a consequence of deadly harm. Intimidate: Fixed capability. A creature with intimidate cannot be blocked, except by artefact creatures and also by creatures that share a colour with it. Creature: User “I’m a leaf on the wind, watch how I soar…” “The magnificent” - Marc-Etienne Peintre * / * Creature: Architect “You need strong foundations for a building to last.” “The builder” - Marc-Etienne Peintre 1 / 4 Cover: Static ability. The affected permanent is granted with the inability becoming dealt damage, enchanted, blocked, or targeted by any card aided by the reported high quality. Vigilance: Static ability. The affected creature does not touch as soon as declared as an attacker. 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion9 The takeaways I hope you’ll get from this webinar: You know solutions to address security issues, you feel responsible about security, whatever your job is, and you are willing to accept that cloud-native apps should include security by design.
  • 10. Terraform Helm CI/CD K8s Third parties Your Service Code & Services Deployment Cluster Your Data Everything we should take a look at… 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion10
  • 11. How bad can it really be? My cluster: 63 issues A bunch of tutorials, an old Github project of mine and on-the-shelf application installed using Helm. My old unmaintained Github project: 1054 vulnerabilities Security issues spread 3 % 57 % 40 % Cluster Images Exposures 13 pods without security policies 1 service running without data encryption 6 namespaces without network policies associated 6 docker images with vulnerable packages 1 image including a private key 3 docker images built with ROOT user 1 service exposing software information 1 service using a self signed certificate 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion ok if trusted, mine was not 11
  • 12. Securing the infrastructure of your cluster itself Secure your k8s cluster at its root 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
  • 13. How a Kubernetes cluster looks Creature:DeveloperCreature:ArchitectCreature:Boss 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion Worker nodes Namespaces Pods Control-Plane ETCD 13
  • 14. Certificates Managing your Kubernetes cluster yourself Use automatically generated certificates (stored on the API-Server) or generate them yourself. Protect the location of your certificates. Think about a process if you need to revoke your certificates and regenerate new ones. Using a managed Kubernetes engine Certificates are generated and managed by the cloud provider. Depending on the provider, the revoking policy of certificates can be different and should be part of your choice of provider. Creature:ArchitectCreature:Boss 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion14
  • 15. Admission controllers 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion Control every request reaching the API-Server1 2 3 Creature:DeveloperCreature:Architect Limit creation, deletion, modification, or connection rights Define the behaviour of every Kubernetes object running on your cluster Set security strategies on pods or containers 4 15
  • 16. Admission controllers LimitRanger • Any incoming request should not violate the Namespace limit ranges constraints. • Limit Ranges objects enforce min and max resources, storage, requests, for k8s objects in a Namespace (Pod, Container, PersistentVolumeClaim…) ServiceAccount • Automation implementation for ServiceAccounts. • Mandatory if you are using ServiceAccount objects in your cluster (to manage different users accesses to your cluster) NamespaceLifeCycle • New objects cannot be created in a terminating namespace. • Requests on a non-existing namespace are rejected. • Prevents deletion of system reserved namespaces (default, kube-system, kube- public). 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion DefaultStorageClass • Observes the creation of PersistentVolumeClaim objects which does not explicitly provide the storage class to use. • This is usually set by default on managed Kubernetes engine to use the provider's Block storage volumes (bssd) Creature:DeveloperCreature:Architect 16
  • 17. Admission controllers AlwaysPullImages Every new Pod will have its pull policy set to “Always”. • Valid credentials are always required. • Images will always be pulled before starting a container. 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion NodeRestriction • Limits the Node and Pod objects a kubelet can modify. • Kubelets must use credentials in the system:nodes group with a specific username. • Ensures kubelets have the minimal set of permissions required to operate correctly Creature:DeveloperCreature:Architect ResourceQuota • Ensures that incoming requests do not violate constraints listed in a namespace’s ResourceQuota object. • Mandatory if you use ResourceQuota objects on your namespaces. PodSecurityPolicy • Determines if the creation or modification of a pod should be admitted. • This admission controller should be set to allow usage of Pod Security Policies (more details later). 17
  • 18. Network policies 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion Creature:DeveloperCreature:Architect Worker nodes Namespaces Pods By default, pods are non-isolated and accept traffic from any source. By setting a NetworkPolicy that selects pods, they become isolated. Network policies are additive. The network policy applied on a pod is the intersection of all applicable policies egress/ingress rules. Network policies require a CNI supporting them. Worker nodes Namespace Pods Pods NetworkPolicy1 NetworkPolicy2 NetworkPolicy1 Namespace 18
  • 19. Pod security policies 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion Creature:DeveloperCreature:ArchitectCreature:Analyst 19 Pod security policies allow you to define rules in order to accept or reject the creation of pods. This enables the cluster administrators to decide what should run, and what shouldn't, in the cluster. For instance, they could decide to deny all pods that are running as root or that runs in privileged mode.
  • 20. Role-Based Access Control 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion Creature:DeveloperCreature:ArchitectCreature:Analyst A standard authorization mode that can easily be used within a Kubernetes cluster is RBAC, by defining a Role or a ClusterRole. Once Roles are defined, they can be bound by defining a RoleBinding (or ClusterRoleBinding) and assigned specific ServiceAccounts. Accesses can be defined by user or by groups of users. 20
  • 21. Include security concerns in your cloud native application by design Security as a coding philosophy 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
  • 22. Can we code now? 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion Creature:DeveloperCreature:Architect No! Your cluster is safer now that you defined restrictions and rules within the cluster itself, but what about the accesses from outside that you definitely need? I am talking here about your CI/CD, which should have dedicated accesses to the Container Registry, and to your namespaces. One pipeline does not need access to the entire cluster, but only to a dedicated part of it, with a dedicated user defined. 22
  • 23. Now that your CI/CD is set, you may code :) 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion Creature:DeveloperCreature:Architect It may feel like there are a lot of restrictions going on here, but restriction means security. And by designing a production environment with all the necessary security constraints, the value you provide your customers and end users with your services and applications will only be greater. On the development side, there is also the topic of packages vulnerabilities. It may be useful to ask ourselves, on a regular basis, a few simple questions: • Are our lists of required packages/libraries up-to-date? • Do we force a specific version of each package, and how often do we upgrade to the newest version? • If one of our dependancies becomes deprecated, should we invest development time to replacing it so we can keep upgrading our packages? Or should we keep it, no matter the security risk, and freeze our package version from this point? 23
  • 24. Security as a coding philosophy Security should not be seen as a constraint, but as an opportunity to learn, improve, and we should be willing to do it by default. It will never be a waste of time. 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion24
  • 25. Managing third parties security 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion Tl;dr; Being on the shelf does not make it safe
  • 26. Third parties: do you really know what you use? 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion Creature:DeveloperCreature:ArchitectCreature:AnalystCreature:Boss We need third parties because we cannot nor do we want to reinvent the wheel. On-the-shelf services and applications allows us to go faster, open source or on-premise, businesses use third parties for the purpose they serve: monitoring, logging, database, caching, analytics, and much more. Those services, like all others, have been coded by humans, and they are not immune to vulnerabilities. 26
  • 27. Third parties: do you really know what you use? 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion Creature:DeveloperCreature:ArchitectCreature:AnalystCreature:Boss Using a container on the shelf might have been built by ROOT user, making it accessible for anyone, including an attacker who got into your production system if it is not secured enough. Those thirds parties must not be forgotten while defining security policies (pods and network), namespace isolation, and user access rights. Is the security level of an “on-the-shelf service" a criteria when designing your architecture and software? 27
  • 28. How to put your data in a safe Lock your data 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
  • 29. Your data 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion Creature:UserCreature:DeveloperCreature:ArchitectCreature:AnalystCreature:Boss Users data • Can be stored the same way as your software data, but contain valuable, critical and personal information about your customers. • A leak of your users' data can kill your business. Software data • Often stored in a managed database where its security, redundancy, and availability is ensured by the cloud provider. • Sometimes managed on a dedicated server(s), implying managing the security of the server(s), as well as the redundancy. Analytics data • Statistics, metrics, sensors, valuable data that can be treated and in multiple ways, from simple statistics to transformation pipelines and even machine learning algorithms. • These data can be the added value you have compared to your competitors, and they often require dedicated storage because of their volume, format, and specific querying requirements. 29
  • 30. Access restriction, encryption 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion Creature:UserCreature:DeveloperCreature:ArchitectCreature:Analyst Kubernetes and data storage • Kubernetes is often described as stateless, meaning that it is not meant to host persistent data directly on the nodes, which is logical once we consider the node auto-healing and node autoscaling features. • Though, data storage is possible in a Kubernetes cluster, using persistent volumes, such as Block Storage. • Even if running a database in a Kubernetes cluster is not recommended, it is possible and quite easy to do so. • Persistent volumes can be protected by restricting their access right solely to the pod to which they are connected. • Data stored in persistent volumes can also be encrypted if it is supported by the CSI of the cloud provider you use. 30
  • 31. Your customer’s data: laws are coming 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion Creature:ArchitectCreature:AnalystCreature:Boss Data under protection • GDPR: General Data Protection Regulation (Europe) • LGPD: Lei Geral de Proteção de Dados Pessoais (Brazil) Customers, users and people are now increasingly protected by laws like the GDPR. These laws state that personal data, such as web browsing information, social information, actions tracked on a website or software... are the property of the user, and that, at any time, they have to be deleted upon the user’s demand. This request has a huge effect on Software and data pipelines, because not only is it a specific feature, but if your software is communicating this data to another software, the deletion order should follow. This also asks the question of anonymised data for machine learning or statistics. For now, a machine learning model based on anonymised data does not have to be re-trained without the removed data, but if the law evolves, it could be the case and have a drastic impact on some software and businesses. The best thing to do is to ensure that this data is safe, anonymous, and legitimate. Only keep what you need, and justify what it is used for. 31
  • 32. Tl;dr; if you did not listen nor read, at least take this home with you Security cheat sheet 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
  • 33. Security Cheat Sheet 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion Choose wisely • Your cloud provider: what is its revoke certificate strategy? • Your third parties: are they secured, vulnerable, mandatory? Design before code • The production infrastructure of your software will define the roles, users, and best practices to code with serenity. • Learn and be curious about vulnerabilities. • Know your priorities when it comes to security. • Who can access what, and should they be able to? Start fresh • Set your admission controllers (at least): NamespaceLifeCycle, LimitRanger, ServiceAccount, DefaultStorageClass, PodSecurityPolicy, ResourceQuota. • Define Pod security policies to define rules for pods' creation. • Define Network security policies to isolate pods within your cluster. Be responsible • A production environment is everyone's responsibility • You are in the same boat, don't let other people row when things get complicated 33
  • 34. An engaged team makes for a protected customer 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion FirstStrike:Acreaturewithfirststrikewilldealits fightdamagebeforeacreatureitdoesn’t. Trample:Staticability.Afterattacking,thecreature withTramplecanassigntherestofthedamagenot takenbythefirsttargettotargetothercreatures. Creature:Boss “Noonecandefeatthedecisionmaker.” “Scaleway’smascotrules”-Marc-EtiennePeintre 5/* Landwalk:Staticability.Theaffectedcreaturemay notbeobstructedprovidingtheprotectingplayer settingsalandassociatedwiththespecifiedtype. Shroud:Staticability.Theimpactedpermanentor playercannotbethegoalofeverymeansorabilities, togetherwithyourown. Creature:Analyst “Dataiseverythingandmore.” “Connectionsandcorrelations”-Marc-EtiennePeintre 3/2 Lifelink:Fixedcapability.Wheneveracardwith lifelinkdealsdamage,thecontrollerofthiscard additionallygainslifecorrespondingtotheamountof damagedealt. Banding:Whenseveralcreatureswithbanding, temporally'band'together,itcanbecomeone creaturetoeitherassaultorblock. Creature:Developer “It’snotabug,it’safeature!” “Scaleway’smascotspacecowboy”-Marc-EtiennePeintre 2/2 Indestructible: Any permanent which has indestructible can't be damaged, and cannot perish as a consequence of deadly harm. Intimidate: Fixed capability. A creature with intimidate cannot be blocked, except by artefact creatures and also by creatures that share a colour with it. Creature: User “I’m a leaf on the wind, watch how I soar…” “The magnificent” - Marc-Etienne Peintre * / * Creature:Architect “Youneedstrongfoundationsforabuildingtolast.” “Thebuilder”-Marc-EtiennePeintre 1/4 Cover:Staticability.Theaffectedpermanentis grantedwiththeinabilitybecomingdealtdamage, enchanted,blocked,ortargetedbyanycardaidedby thereportedhighquality. Vigilance:Staticability.Theaffectedcreaturedoes nottouchassoonasdeclaredasanattacker. 34
  • 35. Better safe than sorry KAPSLOCKED 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion
  • 36. Conclusion 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion You should be safer than 50% of other production systems. Good enough? That’s for you to decide. Have a look at the official Kubernetes documentation about the different topics related to this presentation • Certificates • Admission Controllers • Service Account • Network Policies • Pod Security Policy Feel free to join us on slack (https://slack.scaleway.com/) #k8s. Our Kubernetes community now has more than 650 members. 36
  • 37. Conclusion “Care, but don’t overthink it” 19/11/2020 - Understand, verify, and act on the security of your clusters - Emmanuelle Demompion37
  • 38. #k8s slack channel @ema - @ben - @jth - @Sh4d1 Merci !