Kubernetes Security Audit Open Sourced
Written by Kay Ewbank   
Tuesday, 20 August 2019

A security audit of Kubernetes has been made available in an open source format. The project  reviewed the security of Kubernetes, and produced a threat model alongside the security review.

This is the latest and largest security audit undertaken on behalf of the Cloud Native Computing Foundation (CNCF). Last year it audited CoreDNS, Envoy and Prometheus, made the audits public, and has since seen core maintainers for the three projects address the vulnerabilities identified.

kubernetes

The audit was undertaken by CNCF's Third Party Security Audit Working Group, Trail of Bits and Atredis Partners, and looked at a number of Kubernetes components across six control families:

  • Networking
  • Cryptography
  • Authentication
  • Authorization
  • Secrets Management
  • Multi-tenancy 

CNCF says that as Kubernetes itself is a large system, with functionality spanning from API gateways to container orchestration to networking and beyond, this audit concentrated on eight components within the larger Kubernetes ecosystem for evaluation in the threat model: 

  • Kube-apiserver
  • Etcd
  • Kube-scheduler
  • Kube-controller-manager
  • Cloud-controller-manager
  • Kubelet
  • Kube-proxy
  • Container Runtime

Some of the main findings in the report (which can be downloaded from GitHub) are that security policies may not be applied, leading to a false sense of security by users. Insecure TLS is in use by default, and credentials are exposed in environment variables and command-line arguments. 

Other problems include the leaking in logs of the names of secrets; no revocation of certificates, and the fact that seccomp is not enabled by default. Of the security vulnerabilities discovered, half of the most severe have already been updated in the most recent release of Kubernetes.

For the moment (and until the problems identified in the audit are corrected), the recommendation is that cluster administrators use attribute based access controls rather than relying on role based access controls. Where role based access controls (RBAC) are necessary, administrators should ensure they follow RBAC best practices.

Kubernetes developers are advised to avoid hardcoding paths to dependencies, and to carry out file permissions checking. Processes on Linux should be monitored, and processes should moved to a cgroup.

The report makes interesting reading for anyone thinking about securing systems, as does the accompanying 50 page threat model document.

kubernetes

 

More Information

Kubernetes Security Audit Report On GitHub

Cloud Native Computing Foundation

Related Articles

Red Hat Launches Quarkus For Kubernetes-Native Apps

Instaclustr Releases Cassandra Tools

GitLab Adds Auto DevOps

 

 

To be informed about new articles on I Programmer, sign up for our weekly newsletter, subscribe to the RSS feed and follow us on Twitter, Facebook or Linkedin.

Banner


TestSprite Announces End-to-End QA Tool
14/11/2024

TestSprite has announced an early access beta program for its end-to-end QA tool, along with $1.5 million pre-seed funding aimed at accelerating product development, expanding the team, and scaling op [ ... ]



Apache Fury Adds Optimized Serializers For Scala
31/10/2024

Apache Fury has been updated to add GraalVM native images and with optimized serializers for Scala collection. The update also reduces Scala collection serialization cost via the use of  encoding [ ... ]


More News

espbook

 

Comments




or email your comment to: comments@i-programmer.info

Last Updated ( Tuesday, 20 August 2019 )