Preface |
|
ix | |
1 Introduction |
|
1 | (14) |
|
|
2 | (1) |
|
|
3 | (6) |
|
|
4 | (3) |
|
|
7 | (2) |
|
|
9 | (2) |
|
|
11 | (2) |
|
|
13 | (1) |
|
|
13 | (2) |
2 Pod-Level Resources |
|
15 | (44) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (3) |
|
|
18 | (1) |
|
|
19 | (1) |
|
Kubernetes Workloads: Apps in a Pod |
|
|
20 | (2) |
|
|
22 | (5) |
|
|
27 | (10) |
|
Sharing Network and Storage |
|
|
28 | (2) |
|
What's the Worst That Could Happen? |
|
|
30 | (4) |
|
|
34 | (3) |
|
Pod Configuration and Threats |
|
|
37 | (13) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
41 | (2) |
|
|
43 | (1) |
|
CPU and Memory Limits and Requests |
|
|
43 | (1) |
|
|
44 | (2) |
|
|
46 | (3) |
|
|
49 | (1) |
|
Scheduler and Tolerations |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
Using the securityContext Correctly |
|
|
50 | (7) |
|
Enhancing the securityContext with Kubesec |
|
|
52 | (1) |
|
|
53 | (4) |
|
Into the Eye of the Storm |
|
|
57 | (1) |
|
|
58 | (1) |
3 Container Runtime Isolation |
|
59 | (30) |
|
|
59 | (1) |
|
|
60 | (2) |
|
Containers, Virtual Machines, and Sandboxes |
|
|
62 | (11) |
|
How Virtual Machines Work |
|
|
64 | (3) |
|
Benefits of Virtualization |
|
|
67 | (1) |
|
What's Wrong with Containers? |
|
|
67 | (2) |
|
User Namespace Vulnerabilities |
|
|
69 | (4) |
|
|
73 | (13) |
|
|
75 | (7) |
|
|
82 | (2) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
4 Applications and Supply Chain |
|
89 | (36) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (7) |
|
|
94 | (1) |
|
|
95 | (1) |
|
Ingesting Open Source Software |
|
|
96 | (1) |
|
Which Producers Do We Trust? |
|
|
97 | (1) |
|
CNCF Security Technical Advisory Group |
|
|
98 | (2) |
|
Architecting Containerized Apps for Resilience |
|
|
98 | (1) |
|
|
99 | (1) |
|
Captain Hashjack Attacks a Supply Chain |
|
|
100 | (3) |
|
Post-Compromise Persistence |
|
|
102 | (1) |
|
|
102 | (1) |
|
Container Image Build Supply Chains |
|
|
103 | (3) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
The State of Your Container Supply Chains |
|
|
106 | (4) |
|
|
107 | (1) |
|
Software Bills of Materials |
|
|
108 | (2) |
|
|
110 | (1) |
|
Signing Builds and Metadata |
|
|
110 | (4) |
|
|
111 | (1) |
|
|
111 | (2) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
Infrastructure Supply Chain |
|
|
114 | (1) |
|
|
114 | (1) |
|
Attacking Higher Up the Supply Chain |
|
|
114 | (1) |
|
Types of Supply Chain Attack |
|
|
115 | (5) |
|
|
117 | (2) |
|
Application Vulnerability Throughout the SDLC |
|
|
119 | (1) |
|
Defending Against SUNBURST |
|
|
120 | (3) |
|
|
123 | (2) |
5 Networking |
|
125 | (24) |
|
|
126 | (7) |
|
|
128 | (1) |
|
|
128 | (1) |
|
Pod-to-Worker Node Traffic |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
No Encryption on the Wire |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
134 | (5) |
|
|
134 | (3) |
|
Network Policies to the Rescue! |
|
|
137 | (2) |
|
|
139 | (5) |
|
|
139 | (1) |
|
|
140 | (1) |
|
Case Study: mTLS with Linkerd |
|
|
141 | (3) |
|
|
144 | (3) |
|
|
144 | (1) |
|
|
144 | (1) |
|
Case Study: Attaching a Probe to a Go Program |
|
|
145 | (2) |
|
|
147 | (2) |
6 Storage |
|
149 | (22) |
|
|
150 | (1) |
|
|
150 | (2) |
|
|
152 | (10) |
|
Everything Is a Stream of Bytes |
|
|
152 | (1) |
|
|
153 | (1) |
|
Container Volumes and Mounts |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (2) |
|
Volume Mount Breaks Container Isolation |
|
|
158 | (2) |
|
|
160 | (2) |
|
Sensitive Information at Rest |
|
|
162 | (2) |
|
|
162 | (1) |
|
Attacking Mounted Secrets |
|
|
163 | (1) |
|
|
164 | (6) |
|
Container Storage Interface |
|
|
164 | (1) |
|
|
165 | (2) |
|
|
167 | (2) |
|
The Dangers of Host Mounts |
|
|
169 | (1) |
|
Other Secrets and Exfiltraing from Datastores |
|
|
169 | (1) |
|
|
170 | (1) |
7 Hard Multitenancy |
|
171 | (22) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (4) |
|
|
174 | (2) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
178 | (3) |
|
|
178 | (1) |
|
|
179 | (1) |
|
Public Cloud Multitenancy |
|
|
180 | (1) |
|
|
181 | (6) |
|
|
182 | (2) |
|
Scheduler and Controller Manager |
|
|
184 | (3) |
|
|
187 | (1) |
|
Cluster Isolation Architecture |
|
|
188 | (2) |
|
Cluster Support Services and Tooling Environments |
|
|
190 | (1) |
|
Security Monitoring and Visibility |
|
|
191 | (1) |
|
|
191 | (2) |
8 Policy |
|
193 | (30) |
|
|
194 | (1) |
|
|
194 | (4) |
|
|
195 | (1) |
|
Limiting Resource Allocations |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (2) |
|
|
199 | (1) |
|
|
199 | (1) |
|
Authentication and Authorization |
|
|
200 | (4) |
|
|
201 | (1) |
|
|
201 | (3) |
|
Role-Based Access Control (RBAC) |
|
|
204 | (8) |
|
|
204 | (1) |
|
|
205 | (2) |
|
|
207 | (2) |
|
Analyzing and Visualizing RBAC |
|
|
209 | (2) |
|
|
211 | (1) |
|
|
212 | (9) |
|
|
212 | (6) |
|
|
218 | (2) |
|
|
220 | (1) |
|
|
221 | (2) |
9 Intrusion Detection |
|
223 | (16) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
224 | (2) |
|
|
226 | (3) |
|
Kubernetes and Container Intrusion Detection |
|
|
227 | (1) |
|
|
227 | (2) |
|
Machine Learning Approaches to IDS |
|
|
229 | (1) |
|
|
230 | (2) |
|
|
232 | (2) |
|
|
234 | (1) |
|
|
235 | (1) |
|
Security Operations Centers |
|
|
236 | (1) |
|
|
237 | (2) |
10 Organizations |
|
239 | (18) |
|
|
240 | (1) |
|
|
241 | (6) |
|
|
242 | (1) |
|
|
243 | (2) |
|
Grouping People and Resources |
|
|
245 | (1) |
|
|
246 | (1) |
|
|
247 | (2) |
|
|
249 | (6) |
|
|
249 | (3) |
|
How SLOs Can Put Additional Pressure on You |
|
|
252 | (1) |
|
|
252 | (2) |
|
Privacy and Regulatory Concerns |
|
|
254 | (1) |
|
|
255 | (2) |
A A Pod-Level Attack |
|
257 | (14) |
B Resources |
|
271 | (8) |
Index |
|
279 | |