SlideShare uma empresa Scribd logo
1 de 15
for your kubernetes native applications
Adding Security to DevOps
1
2
Accelerate your journey to Kubernetes
with the Konveyor Community
A community of people passionate about
helping others modernize and migrate
their applications to the hybrid cloud by
building tools and best practices on
how to break down monoliths, adopt
containers, and embrace Kubernetes.
www.konveyor.io
Watch The Presentation
https://youtu.be/YqJMQP7XutI
4
About Me
▸ Krishnnan Narayana swamy
▸ Specialist Solutions Architect, ANZ
▸ Based in Melbourne, Australia
▸ https://github.com/krnaraya
▸ https://www.linkedin.com/in/nkrishnan/
5
Bake Security into Dev & Ops
What we’ll discuss today...
▸ Kubernetes Security Best Practices
▸ Kubernetes Native Security through
StackRox
▸ StackRox Kubernetes Security
Platform Architecture
▸ Demo
7
Why Container security is Important?
Kubernetes Architecture
Source: https://services.google.com/fh/files/misc/why_container_security_matters.pdf
8
Kubernetes Security
Best Practices
Source: https://www.stackrox.com/post/2019/10/kubernetes-security-best-practices-video-and-demo/
https://www.openshift.com/blog/hardening-docker-containers-images-and-host-security-toolkit
https://www.openshift.com/blog/12-kubernetes-configuration-best-practices
9
Container
Image
Source
Monitor & Optimize
Operate
Deploy
Release
Test
Build
Code
Container
Orchestration
Container
Registry
Build
Automation
Binary
Repository
Source Code
Management
IDE Cluster
Phase
Context
Tools
Security
Categories
Data Controls
Audit & Monitoring
Platform Hardening
Network Controls
Compliance
Application Analysis
Identity & Access
Data Controls
Audit & Monitoring
Platform Hardening
Network Controls
Compliance
Application Analysis
Identity & Access
Application Analysis
Identity & Access
Application Analysis
Identity & Access
Application Analysis
Identity & Access
Network Controls
Compliance
Application Analysis
Identity & Access
Compliance
Application Analysis
Identity & Access
DevOps -> DevSecOps
Shift Left on Security
10
Kubernetes Security becomes cloud-native
Image scanning Registries CI/CD tools DevOps notification SIEM
Any Kubernetes
distribution
Build
Secure supply chain
Deploy
Secure infrastructure
Run
Secure workloads
StackRox Kubernetes Security Platform
Policy engine API
AWS Security Hub
Run anywhere
▸ Public cloud
▸ Private cloud
▸ Hybrid/Multi-cloud
11
StackRox Platform Architecture
12
Stackrox Use Cases
Kubernetes Cloud Native Security
Trusted content
Container registry
Build management
CI/CD pipeline
Kubernetes platform lifecycle
Identity and access management
Platform data
Deployment policies
Container isolation
Network isolation
Application access and data
Observability
Detect Protect Respond
DevSecOps
Vulnerability analysis
App config analysis
APIs for CI/CD integrations
Image assurance and policy admission
controller
Compliance assessments
Risk profiling
Runtime behavioral analysis
Auto-suggest network policies
Threat detection / incident response
13
KubeLinter
StackRox Shifted Left
▸ Open source Apache 2.0 license
▸ Checks Kubernetes YAML files and
Helm charts
▸ 16 default checks
▸ Extensible with custom checks
▸ Integrates with any CI tool
KubeLinter as a GitHub action
https://github.com/stackrox/kube-linter
14
Welcome to StackRox.io community
Open source version
▸ Join our Slack Channel
▸ Participate
▸ Contribute
Join the Konveyor Community
www.konveyor.io
Chat with us on Slack
Thank you!
16
Krishnan Narayana Swamy
Specialist Solutions Architect
krnaraya@redhat.com
+61420233535
https://www.linkedin.com/in/nkrishnan/

Mais conteúdo relacionado

Mais procurados

Tackle Containerization Advisor (TCA) for Legacy Applications
Tackle Containerization Advisor (TCA) for Legacy ApplicationsTackle Containerization Advisor (TCA) for Legacy Applications
Tackle Containerization Advisor (TCA) for Legacy ApplicationsKonveyor Community
 
Migrating Java JBoss EAP Applications to Kubernetes With S2I
Migrating Java JBoss EAP Applications to Kubernetes With S2IMigrating Java JBoss EAP Applications to Kubernetes With S2I
Migrating Java JBoss EAP Applications to Kubernetes With S2IKonveyor Community
 
Tackle-test: An Automatic Unit-level Test Case Generator
Tackle-test: An Automatic Unit-level Test Case GeneratorTackle-test: An Automatic Unit-level Test Case Generator
Tackle-test: An Automatic Unit-level Test Case GeneratorKonveyor Community
 
[Konveyor] address technical risks when implementing workload modernization u...
[Konveyor] address technical risks when implementing workload modernization u...[Konveyor] address technical risks when implementing workload modernization u...
[Konveyor] address technical risks when implementing workload modernization u...Konveyor
 
How Docker EE is Finnish Railway’s Ticket to App Modernization
How Docker EE is Finnish Railway’s Ticket to App ModernizationHow Docker EE is Finnish Railway’s Ticket to App Modernization
How Docker EE is Finnish Railway’s Ticket to App ModernizationDocker, Inc.
 
WebSphere 20th - Application modernization
WebSphere 20th - Application modernizationWebSphere 20th - Application modernization
WebSphere 20th - Application modernizationArthur De Magalhaes
 
Building Your NoSQL Ship: How an Enterprise Transitioned from a RDBMS to NoSQ...
Building Your NoSQL Ship: How an Enterprise Transitioned from a RDBMS to NoSQ...Building Your NoSQL Ship: How an Enterprise Transitioned from a RDBMS to NoSQ...
Building Your NoSQL Ship: How an Enterprise Transitioned from a RDBMS to NoSQ...Docker, Inc.
 
Migrating a Large Fortune 100 Healthcare Company to Kubernetes in 7 months
Migrating a Large Fortune 100 Healthcare Company to Kubernetes in 7 monthsMigrating a Large Fortune 100 Healthcare Company to Kubernetes in 7 months
Migrating a Large Fortune 100 Healthcare Company to Kubernetes in 7 monthsKonveyor Community
 
#bigwhale: An Unexpected Journey into Containerization @ Lockheed Martin - Pa...
#bigwhale: An Unexpected Journey into Containerization @ Lockheed Martin - Pa...#bigwhale: An Unexpected Journey into Containerization @ Lockheed Martin - Pa...
#bigwhale: An Unexpected Journey into Containerization @ Lockheed Martin - Pa...Docker, Inc.
 
Migrating from oracle soa suite to microservices on kubernetes
Migrating from oracle soa suite to microservices on kubernetesMigrating from oracle soa suite to microservices on kubernetes
Migrating from oracle soa suite to microservices on kubernetesKonveyor Community
 
Create a One Click Migration (OCM) process to Automate Repeatable Infrastruct...
Create a One Click Migration (OCM) process to Automate Repeatable Infrastruct...Create a One Click Migration (OCM) process to Automate Repeatable Infrastruct...
Create a One Click Migration (OCM) process to Automate Repeatable Infrastruct...Quantyca - Data at Core
 
Digital Transformation with Docker, Cloud, and DevOps: How JCPenney Handles B...
Digital Transformation with Docker, Cloud, and DevOps: How JCPenney Handles B...Digital Transformation with Docker, Cloud, and DevOps: How JCPenney Handles B...
Digital Transformation with Docker, Cloud, and DevOps: How JCPenney Handles B...Docker, Inc.
 
Open Container Technologies and OpenStack - Sorting Through Kubernetes, the O...
Open Container Technologies and OpenStack - Sorting Through Kubernetes, the O...Open Container Technologies and OpenStack - Sorting Through Kubernetes, the O...
Open Container Technologies and OpenStack - Sorting Through Kubernetes, the O...Daniel Krook
 
OpenShift Application Development | DO288 | Red Hat OpenShift
OpenShift Application Development | DO288 | Red Hat OpenShiftOpenShift Application Development | DO288 | Red Hat OpenShift
OpenShift Application Development | DO288 | Red Hat OpenShiftGlobal Knowledge Technologies
 
DockerCon 2017: Docker in China
DockerCon 2017: Docker in ChinaDockerCon 2017: Docker in China
DockerCon 2017: Docker in ChinaZhimin Tang
 
Introduction to Kubernetes and GKE
Introduction to Kubernetes and GKEIntroduction to Kubernetes and GKE
Introduction to Kubernetes and GKEOpsta
 
[Konveyor] roles & processes that make application modernization projects...
[Konveyor] roles & processes that make application modernization projects...[Konveyor] roles & processes that make application modernization projects...
[Konveyor] roles & processes that make application modernization projects...Konveyor Community
 
CICD Pipelines for Microservices: Lessons from the Trenches
CICD Pipelines for Microservices: Lessons from the TrenchesCICD Pipelines for Microservices: Lessons from the Trenches
CICD Pipelines for Microservices: Lessons from the TrenchesCodefresh
 
Dipping Your Toes Into Cloud Native Application Development
Dipping Your Toes Into Cloud Native Application DevelopmentDipping Your Toes Into Cloud Native Application Development
Dipping Your Toes Into Cloud Native Application DevelopmentMatthew Farina
 

Mais procurados (20)

Tackle Containerization Advisor (TCA) for Legacy Applications
Tackle Containerization Advisor (TCA) for Legacy ApplicationsTackle Containerization Advisor (TCA) for Legacy Applications
Tackle Containerization Advisor (TCA) for Legacy Applications
 
Migrating Java JBoss EAP Applications to Kubernetes With S2I
Migrating Java JBoss EAP Applications to Kubernetes With S2IMigrating Java JBoss EAP Applications to Kubernetes With S2I
Migrating Java JBoss EAP Applications to Kubernetes With S2I
 
Tackle-test: An Automatic Unit-level Test Case Generator
Tackle-test: An Automatic Unit-level Test Case GeneratorTackle-test: An Automatic Unit-level Test Case Generator
Tackle-test: An Automatic Unit-level Test Case Generator
 
[Konveyor] address technical risks when implementing workload modernization u...
[Konveyor] address technical risks when implementing workload modernization u...[Konveyor] address technical risks when implementing workload modernization u...
[Konveyor] address technical risks when implementing workload modernization u...
 
How Docker EE is Finnish Railway’s Ticket to App Modernization
How Docker EE is Finnish Railway’s Ticket to App ModernizationHow Docker EE is Finnish Railway’s Ticket to App Modernization
How Docker EE is Finnish Railway’s Ticket to App Modernization
 
WebSphere 20th - Application modernization
WebSphere 20th - Application modernizationWebSphere 20th - Application modernization
WebSphere 20th - Application modernization
 
Building Your NoSQL Ship: How an Enterprise Transitioned from a RDBMS to NoSQ...
Building Your NoSQL Ship: How an Enterprise Transitioned from a RDBMS to NoSQ...Building Your NoSQL Ship: How an Enterprise Transitioned from a RDBMS to NoSQ...
Building Your NoSQL Ship: How an Enterprise Transitioned from a RDBMS to NoSQ...
 
Migrating a Large Fortune 100 Healthcare Company to Kubernetes in 7 months
Migrating a Large Fortune 100 Healthcare Company to Kubernetes in 7 monthsMigrating a Large Fortune 100 Healthcare Company to Kubernetes in 7 months
Migrating a Large Fortune 100 Healthcare Company to Kubernetes in 7 months
 
#bigwhale: An Unexpected Journey into Containerization @ Lockheed Martin - Pa...
#bigwhale: An Unexpected Journey into Containerization @ Lockheed Martin - Pa...#bigwhale: An Unexpected Journey into Containerization @ Lockheed Martin - Pa...
#bigwhale: An Unexpected Journey into Containerization @ Lockheed Martin - Pa...
 
Migrating from oracle soa suite to microservices on kubernetes
Migrating from oracle soa suite to microservices on kubernetesMigrating from oracle soa suite to microservices on kubernetes
Migrating from oracle soa suite to microservices on kubernetes
 
Create a One Click Migration (OCM) process to Automate Repeatable Infrastruct...
Create a One Click Migration (OCM) process to Automate Repeatable Infrastruct...Create a One Click Migration (OCM) process to Automate Repeatable Infrastruct...
Create a One Click Migration (OCM) process to Automate Repeatable Infrastruct...
 
Zero-downtime deployment with Kubernetes [Meetup #21 - 01]
Zero-downtime deployment with Kubernetes [Meetup #21 - 01]Zero-downtime deployment with Kubernetes [Meetup #21 - 01]
Zero-downtime deployment with Kubernetes [Meetup #21 - 01]
 
Digital Transformation with Docker, Cloud, and DevOps: How JCPenney Handles B...
Digital Transformation with Docker, Cloud, and DevOps: How JCPenney Handles B...Digital Transformation with Docker, Cloud, and DevOps: How JCPenney Handles B...
Digital Transformation with Docker, Cloud, and DevOps: How JCPenney Handles B...
 
Open Container Technologies and OpenStack - Sorting Through Kubernetes, the O...
Open Container Technologies and OpenStack - Sorting Through Kubernetes, the O...Open Container Technologies and OpenStack - Sorting Through Kubernetes, the O...
Open Container Technologies and OpenStack - Sorting Through Kubernetes, the O...
 
OpenShift Application Development | DO288 | Red Hat OpenShift
OpenShift Application Development | DO288 | Red Hat OpenShiftOpenShift Application Development | DO288 | Red Hat OpenShift
OpenShift Application Development | DO288 | Red Hat OpenShift
 
DockerCon 2017: Docker in China
DockerCon 2017: Docker in ChinaDockerCon 2017: Docker in China
DockerCon 2017: Docker in China
 
Introduction to Kubernetes and GKE
Introduction to Kubernetes and GKEIntroduction to Kubernetes and GKE
Introduction to Kubernetes and GKE
 
[Konveyor] roles & processes that make application modernization projects...
[Konveyor] roles & processes that make application modernization projects...[Konveyor] roles & processes that make application modernization projects...
[Konveyor] roles & processes that make application modernization projects...
 
CICD Pipelines for Microservices: Lessons from the Trenches
CICD Pipelines for Microservices: Lessons from the TrenchesCICD Pipelines for Microservices: Lessons from the Trenches
CICD Pipelines for Microservices: Lessons from the Trenches
 
Dipping Your Toes Into Cloud Native Application Development
Dipping Your Toes Into Cloud Native Application DevelopmentDipping Your Toes Into Cloud Native Application Development
Dipping Your Toes Into Cloud Native Application Development
 

Semelhante a [Konveyor] adding security to dev ops for your kubernetes native applications

Unlocking the Power of Cloud Native with kubernetes
Unlocking the Power of Cloud Native with kubernetesUnlocking the Power of Cloud Native with kubernetes
Unlocking the Power of Cloud Native with kubernetesJorge Arteiro
 
Best Practices for Running and Implementing Kubernetes
Best Practices for Running and Implementing KubernetesBest Practices for Running and Implementing Kubernetes
Best Practices for Running and Implementing KubernetesDevOps.com
 
給 RD 的 Kubernetes 初體驗
給 RD 的 Kubernetes 初體驗給 RD 的 Kubernetes 初體驗
給 RD 的 Kubernetes 初體驗William Yeh
 
How Kubernetes Consultants Help to Overcome Different Challenges.pptx
How Kubernetes Consultants Help to Overcome Different Challenges.pptxHow Kubernetes Consultants Help to Overcome Different Challenges.pptx
How Kubernetes Consultants Help to Overcome Different Challenges.pptxAddWeb Solution Pvt. Ltd.
 
An Introduction to Container Organization with Docker Swarm, Kubernetes, Meso...
An Introduction to Container Organization with Docker Swarm, Kubernetes, Meso...An Introduction to Container Organization with Docker Swarm, Kubernetes, Meso...
An Introduction to Container Organization with Docker Swarm, Kubernetes, Meso...Neo4j
 
DevOps Training | DevOps Training in Hyderabad
DevOps Training | DevOps Training in Hyderabad   DevOps Training | DevOps Training in Hyderabad
DevOps Training | DevOps Training in Hyderabad TalluriRenuka
 
Best online kubernetes course in H2KInfosys.pdf
Best online kubernetes course in H2KInfosys.pdfBest online kubernetes course in H2KInfosys.pdf
Best online kubernetes course in H2KInfosys.pdfabhayah2k
 
Kubernetes for java developers
Kubernetes for java developersKubernetes for java developers
Kubernetes for java developersSandro Giacomozzi
 
Container World 2017!
Container World 2017!Container World 2017!
Container World 2017!kgraham32
 
Containerization Use Cases.pdf
Containerization Use Cases.pdfContainerization Use Cases.pdf
Containerization Use Cases.pdfSimform
 
Shifting security to the left with kubernetes, azure, and istio
Shifting security to the left with kubernetes, azure, and istioShifting security to the left with kubernetes, azure, and istio
Shifting security to the left with kubernetes, azure, and istioChristian Melendez
 
What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...
What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...
What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...Edureka!
 
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdfFive Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdfEnterprise Insider
 
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
Applied Security for Containers, OW2con'18, June 7-8, 2018, ParisApplied Security for Containers, OW2con'18, June 7-8, 2018, Paris
Applied Security for Containers, OW2con'18, June 7-8, 2018, ParisOW2
 
Why is Kubernetes considered the next generation application platform
Why is Kubernetes considered the next generation application platformWhy is Kubernetes considered the next generation application platform
Why is Kubernetes considered the next generation application platformCalidad Infotech
 
Kubernetes: https://youtu.be/KnjnQj-FvfQ
Kubernetes: https://youtu.be/KnjnQj-FvfQKubernetes: https://youtu.be/KnjnQj-FvfQ
Kubernetes: https://youtu.be/KnjnQj-FvfQRahul Malhotra
 
Modern DevOps with Spinnaker - Olga Kundzich
Modern DevOps with Spinnaker - Olga KundzichModern DevOps with Spinnaker - Olga Kundzich
Modern DevOps with Spinnaker - Olga KundzichVMware Tanzu
 
Microsoft: Enterprise search for cloud native applications
Microsoft: Enterprise search for cloud native applicationsMicrosoft: Enterprise search for cloud native applications
Microsoft: Enterprise search for cloud native applicationsElasticsearch
 
How to Secure Containerized Applications
How to Secure Containerized ApplicationsHow to Secure Containerized Applications
How to Secure Containerized ApplicationsDevOps.com
 
Kubernetes on on on on on on on on on on on on on on Azure Deck.pptx
Kubernetes on on on on on on on on on on on on on on Azure Deck.pptxKubernetes on on on on on on on on on on on on on on Azure Deck.pptx
Kubernetes on on on on on on on on on on on on on on Azure Deck.pptxHectorSebastianMendo
 

Semelhante a [Konveyor] adding security to dev ops for your kubernetes native applications (20)

Unlocking the Power of Cloud Native with kubernetes
Unlocking the Power of Cloud Native with kubernetesUnlocking the Power of Cloud Native with kubernetes
Unlocking the Power of Cloud Native with kubernetes
 
Best Practices for Running and Implementing Kubernetes
Best Practices for Running and Implementing KubernetesBest Practices for Running and Implementing Kubernetes
Best Practices for Running and Implementing Kubernetes
 
給 RD 的 Kubernetes 初體驗
給 RD 的 Kubernetes 初體驗給 RD 的 Kubernetes 初體驗
給 RD 的 Kubernetes 初體驗
 
How Kubernetes Consultants Help to Overcome Different Challenges.pptx
How Kubernetes Consultants Help to Overcome Different Challenges.pptxHow Kubernetes Consultants Help to Overcome Different Challenges.pptx
How Kubernetes Consultants Help to Overcome Different Challenges.pptx
 
An Introduction to Container Organization with Docker Swarm, Kubernetes, Meso...
An Introduction to Container Organization with Docker Swarm, Kubernetes, Meso...An Introduction to Container Organization with Docker Swarm, Kubernetes, Meso...
An Introduction to Container Organization with Docker Swarm, Kubernetes, Meso...
 
DevOps Training | DevOps Training in Hyderabad
DevOps Training | DevOps Training in Hyderabad   DevOps Training | DevOps Training in Hyderabad
DevOps Training | DevOps Training in Hyderabad
 
Best online kubernetes course in H2KInfosys.pdf
Best online kubernetes course in H2KInfosys.pdfBest online kubernetes course in H2KInfosys.pdf
Best online kubernetes course in H2KInfosys.pdf
 
Kubernetes for java developers
Kubernetes for java developersKubernetes for java developers
Kubernetes for java developers
 
Container World 2017!
Container World 2017!Container World 2017!
Container World 2017!
 
Containerization Use Cases.pdf
Containerization Use Cases.pdfContainerization Use Cases.pdf
Containerization Use Cases.pdf
 
Shifting security to the left with kubernetes, azure, and istio
Shifting security to the left with kubernetes, azure, and istioShifting security to the left with kubernetes, azure, and istio
Shifting security to the left with kubernetes, azure, and istio
 
What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...
What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...
What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...
 
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdfFive Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
 
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
Applied Security for Containers, OW2con'18, June 7-8, 2018, ParisApplied Security for Containers, OW2con'18, June 7-8, 2018, Paris
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
 
Why is Kubernetes considered the next generation application platform
Why is Kubernetes considered the next generation application platformWhy is Kubernetes considered the next generation application platform
Why is Kubernetes considered the next generation application platform
 
Kubernetes: https://youtu.be/KnjnQj-FvfQ
Kubernetes: https://youtu.be/KnjnQj-FvfQKubernetes: https://youtu.be/KnjnQj-FvfQ
Kubernetes: https://youtu.be/KnjnQj-FvfQ
 
Modern DevOps with Spinnaker - Olga Kundzich
Modern DevOps with Spinnaker - Olga KundzichModern DevOps with Spinnaker - Olga Kundzich
Modern DevOps with Spinnaker - Olga Kundzich
 
Microsoft: Enterprise search for cloud native applications
Microsoft: Enterprise search for cloud native applicationsMicrosoft: Enterprise search for cloud native applications
Microsoft: Enterprise search for cloud native applications
 
How to Secure Containerized Applications
How to Secure Containerized ApplicationsHow to Secure Containerized Applications
How to Secure Containerized Applications
 
Kubernetes on on on on on on on on on on on on on on Azure Deck.pptx
Kubernetes on on on on on on on on on on on on on on Azure Deck.pptxKubernetes on on on on on on on on on on on on on on Azure Deck.pptx
Kubernetes on on on on on on on on on on on on on on Azure Deck.pptx
 

Mais de Konveyor Community

State of application modernization 2024 report
State of application modernization 2024 reportState of application modernization 2024 report
State of application modernization 2024 reportKonveyor Community
 
Tackle 2: New capabilities for modernizing applications to leverage Kubernetes
Tackle 2: New capabilities for modernizing applications to leverage KubernetesTackle 2: New capabilities for modernizing applications to leverage Kubernetes
Tackle 2: New capabilities for modernizing applications to leverage KubernetesKonveyor Community
 
State of application modernization 2022
State of application modernization 2022State of application modernization 2022
State of application modernization 2022Konveyor Community
 
[Konveyor] migrate and modernize your application portfolio to kubernetes wit...
[Konveyor] migrate and modernize your application portfolio to kubernetes wit...[Konveyor] migrate and modernize your application portfolio to kubernetes wit...
[Konveyor] migrate and modernize your application portfolio to kubernetes wit...Konveyor Community
 
Data-centric Application Analysis with Open-source Tool Tackle-DiVA
Data-centric Application Analysis with Open-source Tool Tackle-DiVAData-centric Application Analysis with Open-source Tool Tackle-DiVA
Data-centric Application Analysis with Open-source Tool Tackle-DiVAKonveyor Community
 
Modern Security Pain Points with Application Modernization - With Jermaine Ed...
Modern Security Pain Points with Application Modernization - With Jermaine Ed...Modern Security Pain Points with Application Modernization - With Jermaine Ed...
Modern Security Pain Points with Application Modernization - With Jermaine Ed...Konveyor Community
 
[Konveyor] address technical risks when implementing workload modernization u...
[Konveyor] address technical risks when implementing workload modernization u...[Konveyor] address technical risks when implementing workload modernization u...
[Konveyor] address technical risks when implementing workload modernization u...Konveyor Community
 

Mais de Konveyor Community (7)

State of application modernization 2024 report
State of application modernization 2024 reportState of application modernization 2024 report
State of application modernization 2024 report
 
Tackle 2: New capabilities for modernizing applications to leverage Kubernetes
Tackle 2: New capabilities for modernizing applications to leverage KubernetesTackle 2: New capabilities for modernizing applications to leverage Kubernetes
Tackle 2: New capabilities for modernizing applications to leverage Kubernetes
 
State of application modernization 2022
State of application modernization 2022State of application modernization 2022
State of application modernization 2022
 
[Konveyor] migrate and modernize your application portfolio to kubernetes wit...
[Konveyor] migrate and modernize your application portfolio to kubernetes wit...[Konveyor] migrate and modernize your application portfolio to kubernetes wit...
[Konveyor] migrate and modernize your application portfolio to kubernetes wit...
 
Data-centric Application Analysis with Open-source Tool Tackle-DiVA
Data-centric Application Analysis with Open-source Tool Tackle-DiVAData-centric Application Analysis with Open-source Tool Tackle-DiVA
Data-centric Application Analysis with Open-source Tool Tackle-DiVA
 
Modern Security Pain Points with Application Modernization - With Jermaine Ed...
Modern Security Pain Points with Application Modernization - With Jermaine Ed...Modern Security Pain Points with Application Modernization - With Jermaine Ed...
Modern Security Pain Points with Application Modernization - With Jermaine Ed...
 
[Konveyor] address technical risks when implementing workload modernization u...
[Konveyor] address technical risks when implementing workload modernization u...[Konveyor] address technical risks when implementing workload modernization u...
[Konveyor] address technical risks when implementing workload modernization u...
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

[Konveyor] adding security to dev ops for your kubernetes native applications

  • 1. for your kubernetes native applications Adding Security to DevOps 1
  • 2. 2 Accelerate your journey to Kubernetes with the Konveyor Community A community of people passionate about helping others modernize and migrate their applications to the hybrid cloud by building tools and best practices on how to break down monoliths, adopt containers, and embrace Kubernetes. www.konveyor.io
  • 4. 4 About Me ▸ Krishnnan Narayana swamy ▸ Specialist Solutions Architect, ANZ ▸ Based in Melbourne, Australia ▸ https://github.com/krnaraya ▸ https://www.linkedin.com/in/nkrishnan/
  • 5. 5 Bake Security into Dev & Ops What we’ll discuss today... ▸ Kubernetes Security Best Practices ▸ Kubernetes Native Security through StackRox ▸ StackRox Kubernetes Security Platform Architecture ▸ Demo
  • 6. 7 Why Container security is Important? Kubernetes Architecture Source: https://services.google.com/fh/files/misc/why_container_security_matters.pdf
  • 7. 8 Kubernetes Security Best Practices Source: https://www.stackrox.com/post/2019/10/kubernetes-security-best-practices-video-and-demo/ https://www.openshift.com/blog/hardening-docker-containers-images-and-host-security-toolkit https://www.openshift.com/blog/12-kubernetes-configuration-best-practices
  • 8. 9 Container Image Source Monitor & Optimize Operate Deploy Release Test Build Code Container Orchestration Container Registry Build Automation Binary Repository Source Code Management IDE Cluster Phase Context Tools Security Categories Data Controls Audit & Monitoring Platform Hardening Network Controls Compliance Application Analysis Identity & Access Data Controls Audit & Monitoring Platform Hardening Network Controls Compliance Application Analysis Identity & Access Application Analysis Identity & Access Application Analysis Identity & Access Application Analysis Identity & Access Network Controls Compliance Application Analysis Identity & Access Compliance Application Analysis Identity & Access DevOps -> DevSecOps Shift Left on Security
  • 9. 10 Kubernetes Security becomes cloud-native Image scanning Registries CI/CD tools DevOps notification SIEM Any Kubernetes distribution Build Secure supply chain Deploy Secure infrastructure Run Secure workloads StackRox Kubernetes Security Platform Policy engine API AWS Security Hub Run anywhere ▸ Public cloud ▸ Private cloud ▸ Hybrid/Multi-cloud
  • 11. 12 Stackrox Use Cases Kubernetes Cloud Native Security Trusted content Container registry Build management CI/CD pipeline Kubernetes platform lifecycle Identity and access management Platform data Deployment policies Container isolation Network isolation Application access and data Observability Detect Protect Respond DevSecOps Vulnerability analysis App config analysis APIs for CI/CD integrations Image assurance and policy admission controller Compliance assessments Risk profiling Runtime behavioral analysis Auto-suggest network policies Threat detection / incident response
  • 12. 13 KubeLinter StackRox Shifted Left ▸ Open source Apache 2.0 license ▸ Checks Kubernetes YAML files and Helm charts ▸ 16 default checks ▸ Extensible with custom checks ▸ Integrates with any CI tool KubeLinter as a GitHub action https://github.com/stackrox/kube-linter
  • 13. 14 Welcome to StackRox.io community Open source version ▸ Join our Slack Channel ▸ Participate ▸ Contribute
  • 14. Join the Konveyor Community www.konveyor.io Chat with us on Slack
  • 15. Thank you! 16 Krishnan Narayana Swamy Specialist Solutions Architect krnaraya@redhat.com +61420233535 https://www.linkedin.com/in/nkrishnan/

Notas do Editor

  1. Hello All, Welcome and Thank you for taking your time and joining us today
  2. I am Krishnan Narayana swamy, started my career as a software developer and right after my graduation, few bunch of college mates, we Founded a startup named telesto based on open source lucene search project in 2008 and i have had great association and passion with open source technologies since then. I have in the past and continue to help lot of customers to innovate and adopt open source technologies, especially kubernetes and applications that run on kubernetes, in the best way possible and that is exactly my role as a Specialist Solutions Architect at Redhat ANZ. I am based out of Melbourne in Australia. Feel free to connect with me on linked in and explore my github repositories for my experimentations or demos in the kubernetes space.
  3. I’m a developer and I worked in infrastructure before and I don’t think I thought about security a single time. Basically, what I would do was develop code, make sure it worked on docker containers, push it, and hope for the best; and now looking at it from a security point-of-view, it probably wasn’t the best way to go. So, how do we build security into rolling out our software? How to bake security into your Dev and Ops processes for your applications running in our kubernetes clusters. Kubernetes is Awesome, but the out of the box open source version has little for security. We will discuss why container security is important, some of the kubernetes security best practices and how stackrox kind of bridges the gap here. Stackrox is a recent acquisition by Red hat and we have decided to open source and we are in the process of making the platform open source soon. We will look at the architecture of the platform and its components and how it enables cloud native security for kubernetes clusters and the applications that run in them We will see a demonstration of the product and how it helps in continuous security across your DevOps process and how it integrates into your CI/CD process enabling your Shift Left on security. Let us assume, you have a kubernetes native application deployed and have a solid DevOps practice set up Continuous Integration = Development practice in which developers integrate code into a shared repository (main code path/trunk) every commit; Automated build and unit tests are run to validate the changes. In this way, defects and integration errors are verified and remedied earlier in the process. Continuous Delivery = Orchestrating your build through a series of quality gates with automated/manual approval processes, however the build stops before reaching production - typically additional validations are required (manual, compliance) Continuous Deployment = And extension of Continuous Delivery where the build is pushed automatically from commit to production if all the quality gates are met DevOps-driven adoption of new technologies and processes may leave security as an afterthought or, in some instances, expose new gaps in security coverage and risk management.
  4. Let us assume, you have a kubernetes native application deployed and have a solid DevOps practice set up Continuous Integration = Development practice in which developers integrate code into a shared repository (main code path/trunk) every commit; Automated build and unit tests are run to validate the changes. In this way, defects and integration errors are verified and remedied earlier in the process. Continuous Delivery = Orchestrating your build through a series of quality gates with automated/manual approval processes, however the build stops before reaching production - typically additional validations are required (manual, compliance) Continuous Deployment = And extension of Continuous Delivery where the build is pushed automatically from commit to production if all the quality gates are met DevOps-driven adoption of new technologies and processes may leave security as an afterthought or, in some instances, expose new gaps in security coverage and risk management.
  5. The defaults in upstream Kubernetes can not be assumed to provide adequate protection based on our use case A common reason for attacking containers today is to abuse compute resources, for example, for cryptocurrency mining. can also offer access to customer or workload data. But attacking the container chance to propagate to other nodes in the cluster and also gain persistent access to valuable user code, compute and/or data receives privileged access, they could potentially access information running in the other containers. The Kubernetes master controls your cluster. An attacker that can compromise the master can control the environment, including the ability to take it offline. And a compromised etcd can mean the ability to modify or destroy the cluster, steal secrets and credentials, or gain enough information about the application it’s running to go recreate it somewhere else.
  6. Lets discuss some of the best practices out there At the infrastructure level, i recommend keeping the kubernetes cluster up to date, Make sure that your network access is firewalled off correctly. Make sure the Kubernetes API server (which is basically the entry point into all of your infrastructure) is locked down. (I know a lot of people will restrict it to a VPC or VPN. Just ensure that the traffic to the API server is protected.) Lastly, let’s make sure that the actual host itself is locked down. Leverage a matured CI/CD processes to deploy applications to kubernetes cluster. One service account authorized against your API server. Obviously, you still have people who need access to the cluster, you still need to debug and fix, but now since you have fewer users and groups, you have a much smaller number of people you need to manage in RBAC. From an application / container stand point, It starts with building your image, which means looking at the dependencies, the packages, and most importantly analyzing the vulnerabilities to discover what we already know is bad. Then, you look at how the app is configured: What privileges does it have on host os? What privileges does it have against the API server? Are there weak secrets or other sensitive data (API keys for registries, sensitive databases)? What labels and annotations are used? This is key because it allows you to to answer the question of who owns a given service (annotation of owner, email, or team) and is very valuable for debugging for operations. This also allows you to route the issue quickly to the right owner as opposed to playing a game of murder mystery and trying to figure out who owns this application and who deployed it. Some of the most important configurations best practices that I we highly recommend for containers and Kubernetes are as follows: Mount host-sensitive directories as read-only - this means no one can write to your file system. Set up appropriate SELinux profiles to limit containers mounting unix socket. This gives permissions to run containers, create images and so on.. Use capabilities to grant fine-grained privileges - use CAP DROP and CAP ADD to limit what Linux capabilities containers are allowed to run. Do not run ssh services inside a container. Ensure that there are no unnecessary ports exposed ensure that the container’s ports are not mapped to host ports Network policies – use network policies to limit ingress and egress network communication between Pods (east-west) and from outside to Pods (north-south). Secure the host OS - SELinux RESTRICT A CONTAINER FROM ACQUIRING NEW PRIVILEGES So, the last thing to always remember is that security is hard, more akin to a marathon than a sprint. There’s no such thing as perfect security; it’s always about monitoring, iterating, and making sure that the tools are available for people who are building the code to integrate it into their process and drive security.
  7. Throwing another Buzz word here , the DevSecOps. The idea here is to embed Security early in your development process to prevent any security incidents and enabling continuous security in a cloud native fashion. Another key is the constant feedback loop between the build/deploy phase and the runtime phase. Enable Developers and provide them with the security issues during development and educate them on how they can be fixed. Culture change when it comes to security right, how do we fix a container image that has vulnerability? , we don’t kill the container process and leave it there, we go back and fix them in our source, build and push a new image into production. Cloud native CI/CD processes allow us to do that.
  8. Stackbox runs in kubernetes, supports declarative style and same Cloud native way of doing things, does remediate using kubernetes constructs ..leverages most of the kubernetes out of the box flexibility to achieve things. protection Eliminate blinspots Threats unique kubernetes vulnerabilities Time to implement security and learning cost Remediates in the kubernetes way Operational security - greater uptime Operational conflict - inconsistent configurations Ability to bring security to your build phase, deploy phase and Run phase It supports all kubernetes Disconnected installs on prem and runs anywhere Highly flexible and Integrates with some of the platforms For example, for package scanning scanning for vulnerabilities, it can work with tenable, Quay or anchore or you can use inbuilt scanning. Supports number of different languages including .NET core Integrate with your CI/CD tools including jenkins, DevOps notifications for Jira, slack pagerduty and others.. SIEM toold it can
  9. Central Core function: UI and API server; policy engine How it works: Runs as a Kube service in cluster/VM/cloud; must be able to receive inbound connections from all monitored clusters What it does: Facilitates all UI and customer-facing API interactions Performs policy evaluation Facilitates multi-cluster management of all services environments across various providers and data centers Sensor Core function: Point of integration with Kubernetes; processing engine How it works: Runs as a Kube service with permissions to listen to orchestrator events and CRUD rights for enforcement What it does: Inventories cloud-native components (namespaces, running services, network policies, and orchestrator secrets) Performs detection rule processing Facilitates enforcement Collector a Daemonset Core function: syscall-level data collector How it works: Runs as a container on each host and inserts a kernel module for syscall visibility What it does: Facilitates collection of data for runtime detection Scanner (Optional) Core function: Vulnerability scanning of images How it works: Runs as a Kube HPA in the same cluster as Central. What it does: Handles requests to scan image layers from Central Pulls image layers from registry using configured image integrations Retrieves updated CVE data from stackrox.io or from Central Scanner-db Core function: Database for caching image layer data. How it works: Runs as a single Kube pod with PostgreSQL DB What it does: Caches results of layer scanning Customers do not need to provide redundancy / backup AdmissionController Core function: Plugin to Kube AdmissionController to approve / deny API actions How it works: Runs as a Replicaset, registered as ValidatingWebhookConfiguration What it does: Examines Kubernetes API commands that create pods, deployments, daemonsets, etc. Offer stackrox admins the ability to reject these API requests based on policy. Can also examine Update API commands to reject changes for already deployed Can examine & prevent ‘exec’ and ‘port-forward’ API requests Sensor talks to kube apis to get data , what deployments, what configuration Collector - one pod at the node level, what process. What network traffic
  10. From a cluster level, most of the kubernetes distributions, you can leverage out of the box functionalities to extend it for applying security best practices. For example., From OKE, the upstream open source version of OpenShift few security aspects comes default Secure OS/Infrastructure The core components of the Linux kernel that are used for containers are cgroups — control groups, which define the resources like CPU and memory which are available to a given process — and namespaces, which are a way of separating processes by restricting what each process can see, so that system resources “appear” isolated to the process. Along with cgroups and namespaces, you can also use a Linux Security Module (LSM) like SELinux to configure a container’s capabilities. SELinux. Both deny undesirable default capabilities, like the ability to write to the proc filesystem RHEL CoreOS Cri-o container runtime - provides a smaller footprint and reduced attack surface SELinux Security Built-In Identity & Access Management Compliance Operator - describe the desired compliance state of a cluster and provides them with an overview of gaps and ways to remediate them Volume Encryption File Integrity Operator Security Context Constraints - allow administrators to control permissions for pods Secrets Management All the above from a more cluster level security Stackrox elevates it to the next level or application level and brings in the ability to customize your policies and gives a better visibility and ability respond to those events through notifications. Build Security Vulnerability scanning Vulnerability management CI/CD integration to fail builds Registry integration to block deployments CI/CD Integration for CIS Docker checks/failures Image Content Analysis Deploy Security Declarative Policy Creation Multi-factor risk profiling Compliance benchmarks RBAC analysis for Kubernetes Network policy enforcement Service Configuration Admission Controls Posture Management Kubernetes Events (Execs/Forwards) Runtime Security Intrusion detection & behavioral analysis Network policy visibility/incident detection Deep data collection and correlation for forensics Baselines/whitelists of runtime activity profiles Killing of compromised pods Detection of real-time intrusions, cryptojacking, and orchestrator threats