Skip to content

KG 0.36 - Security #17

@NotChristianGarcia

Description

@NotChristianGarcia

"Who's idea was it to let third-parties run whatever they wanted in a Kubernetes?" A story on how Christian should have done this with Docker.

  • Cert isolation - Can't have a bad cert affect our normal certs. Cert errors could be bad. Should probably create a new cert per thing? Maybe always have it be non-secured?
  • Service isolation - Pods shouldn't be able to use any service at all. No Egress. Only Ingress from nginx.
  • Network isolation - Pods shouldn't be able to make any calls via ip.
  • Pod isolation - Pods shouldn't have k8 control or access to other pods.
  • Environment Variable isolation - Block access to default environment variables.

Metadata

Metadata

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions