SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
Google Cloud Container Security QuickView
Lightning talk of 5-10 minutes....
Krishna Kumar – CNCF Ambassador
Google Cloud Security – Console View – First Look
https://console.cloud.google.com/
Google Compute Engine Security

Google cloud Identity service - IAM

IAM Policies & Organization level
policies

Effectively design the hierarchy

Apply Leave privileaged access policy
mode

Create security groups with conceptual
roles instead randiomly creating users
and groups

Like One top account create/set
polciies & service acconts only and the
other accounts apply it.

Unmanaged credentials night mare!
Key Management Services (KMS)

VPC network can be managed/deleted
as needed

Rootkits & Bootkits for VM hardening

Tools – AuditLogs, CSCC, KMS
Resource Hierarchy in general
Google Container Security
Infrastructure Security Software Supply Chain
Security
Run time Security
Cloud IAM, RBAC Google container Registry Stackdriver – monitoring,
Attack profiles
Compliance Certifications Security Vulnerability
Scanning
Anomolous detection by
third party products like
Twistlocks, acqua, sysdig
Cloud Audit Logging Secure base images Cloud SCC
Container Optimized
minimal OS, Node auto
upgrade
Regular builds Isolation
gVisor sandbox
Network policy, Private
clusters, Shared VPC
Deployment policies,
Binary authorization
Runtime detection – host,
network, workload, Boot
Google Kubernetes Engine Security
Managed Security by Google
●
Control plane security
– Google does the control plane management (Mater VM, Scheduler,
Cntroll manager, API server, etcd, CA, IAM, logging to stackdriver,) &
Patching the contol plane.
●
Node security
– Google handles K8s comoponents, COS (Chromium OS), logging &
monitoring. Autoupgarde & security patches automatically rolled out.
Manage base images.
– Live migration: Node auto upgrade is like adding new node and drain the
work from old.
● Workloads: User need to secure workloads. Protect the secret with
Cloud KMS or KMS plugin (Vault).
Hardening GKE
● Disable the Kubernetes web UI (Dashboard)
● Restrict Cluster discovery RBAC permission & binary authentication
● Restrict Traffic Among Pods with a Network Policy & Pod security policy
● Use Least Privilege Service Accounts for your Nodes
● Restrict your Node Service Account Scopes & Client Authentication Methods
● Protect node metadata & Automatically upgrade nodes
● Authorized networks & meta data concealment
● Google Container Registry (GCR) Vulnerability Scanning
● Third party container security.
● Read secuity bulletins – Vulnerabilties and solutiond
GKE Istio Security
Istio, a service mesh implementation, on GKE is an add-on.
●
The version of Istio installed is tied to the GKE version, and you will not be able to
update them independently.
●
Pilot:
●
Istio Auth ensures that services with sensitive data can only be accessed
●
Istio RBAC provides namespace-level, service-level, and method-level access control
●
Mixer:
●
Istio config policy on server side not client side.
●
Citadel:
●
MutualTLS authentication - both service-to-service and end-user-to-service
●
Automates key and certificate generation, distribution, rotation, and revocation.
Anthos Security
●
Single pane of glass
visibility across all clusters
●
Service-centric view of
your infrastructure
●
Configuration management
& Compliance centralized
●
Istio providing in-cluster
mTLS and certificate
management.
●
3rd
party marketplace
Hybrid cloud solutions: Anthos relies on Google
Kubernetes Engine (GKE) and GKE On-Prem to
manage Kubernetes installations in the environments
Google Cloud Partner Security
●
Splunk
●
Palo alto Networks
●
Checkpoint
●
F5
●
Brocade
●
Nginx
●
Symantec
●
Cisco
●
Hashicorp
●
Acqua
●
Blackduck
●
Twistlock
●
Stackrox
●
& more......
With 3rd
party providers, GCP Protects a wide
variety of hybrid cloud solutions and data.
References
●
https://cloud.google.com/containers/security/
●
https://cloud.google.com/kubernetes-engine/docs/security-bulletins
●
https://cloud.google.com/kubernetes-engine/docs/how-to/hardening-your-cluster
●
https://cloud.google.com/kubernetes-engine/docs/concepts/security-overview
●
https://cloud.withgoogle.com/next/19/sf/sessions?session=SEC110
●
https://console.cloud.google.com/security/command-center/welcome
●
https://cloud.google.com/security/partners/
●
https://cloud.google.com/anthos/docs/concepts/overview
●
https://cloud.google.com/istio/#security
●
https://youtu.be/PfXZovlblJc

Mais conteúdo relacionado

Mais procurados

The Containers Ecosystem, the OpenStack Magnum Project, the Open Container In...
The Containers Ecosystem, the OpenStack Magnum Project, the Open Container In...The Containers Ecosystem, the OpenStack Magnum Project, the Open Container In...
The Containers Ecosystem, the OpenStack Magnum Project, the Open Container In...
Daniel Krook
 

Mais procurados (20)

Csa container-security-in-aws-dw
Csa container-security-in-aws-dwCsa container-security-in-aws-dw
Csa container-security-in-aws-dw
 
Kubecon seattle 2018 recap - Application Deployment aspects
Kubecon seattle 2018 recap - Application Deployment aspectsKubecon seattle 2018 recap - Application Deployment aspects
Kubecon seattle 2018 recap - Application Deployment aspects
 
Kubernetes security with AWS
Kubernetes security with AWSKubernetes security with AWS
Kubernetes security with AWS
 
Kubernetes - how to orchestrate containers
Kubernetes - how to orchestrate containersKubernetes - how to orchestrate containers
Kubernetes - how to orchestrate containers
 
Extending Kubernetes
Extending KubernetesExtending Kubernetes
Extending Kubernetes
 
Introduction to kubernetes
Introduction to kubernetesIntroduction to kubernetes
Introduction to kubernetes
 
How Kubernetes helps Devops
How Kubernetes helps DevopsHow Kubernetes helps Devops
How Kubernetes helps Devops
 
Container Security Essentials
Container Security EssentialsContainer Security Essentials
Container Security Essentials
 
Gentle introduction to containers and kubernetes
Gentle introduction to containers and kubernetesGentle introduction to containers and kubernetes
Gentle introduction to containers and kubernetes
 
Kubernetes Multitenancy - KubeSec Enterprise Security Summit
Kubernetes Multitenancy - KubeSec Enterprise Security SummitKubernetes Multitenancy - KubeSec Enterprise Security Summit
Kubernetes Multitenancy - KubeSec Enterprise Security Summit
 
OpenStack 101 update
OpenStack 101 updateOpenStack 101 update
OpenStack 101 update
 
Why kubernetes for Serverless (FaaS)
Why kubernetes for Serverless (FaaS)Why kubernetes for Serverless (FaaS)
Why kubernetes for Serverless (FaaS)
 
Working with kubernetes
Working with kubernetesWorking with kubernetes
Working with kubernetes
 
The Containers Ecosystem, the OpenStack Magnum Project, the Open Container In...
The Containers Ecosystem, the OpenStack Magnum Project, the Open Container In...The Containers Ecosystem, the OpenStack Magnum Project, the Open Container In...
The Containers Ecosystem, the OpenStack Magnum Project, the Open Container In...
 
Kubernetes: https://youtu.be/KnjnQj-FvfQ
Kubernetes: https://youtu.be/KnjnQj-FvfQKubernetes: https://youtu.be/KnjnQj-FvfQ
Kubernetes: https://youtu.be/KnjnQj-FvfQ
 
Openstack architure part 1
Openstack architure part 1Openstack architure part 1
Openstack architure part 1
 
Admission controllers - PSP, OPA, Kyverno and more!
Admission controllers - PSP, OPA, Kyverno and more!Admission controllers - PSP, OPA, Kyverno and more!
Admission controllers - PSP, OPA, Kyverno and more!
 
DockerCon EU 2015: Monitoring Docker
DockerCon EU 2015: Monitoring DockerDockerCon EU 2015: Monitoring Docker
DockerCon EU 2015: Monitoring Docker
 
Getting started with OpenStack
Getting started with OpenStackGetting started with OpenStack
Getting started with OpenStack
 
OpenStack Architecture
OpenStack ArchitectureOpenStack Architecture
OpenStack Architecture
 

Semelhante a Google Cloud Container Security Quick Overview

Semelhante a Google Cloud Container Security Quick Overview (20)

Kubernetes, Terraform, Vault, and Consul
Kubernetes, Terraform, Vault, and ConsulKubernetes, Terraform, Vault, and Consul
Kubernetes, Terraform, Vault, and Consul
 
Anthos Security: modernize your security posture for cloud native applications
Anthos Security: modernize your security posture for cloud native applicationsAnthos Security: modernize your security posture for cloud native applications
Anthos Security: modernize your security posture for cloud native applications
 
Kubernetes best practices with GKE
Kubernetes best practices with GKEKubernetes best practices with GKE
Kubernetes best practices with GKE
 
Active Directory and Virtualization
Active Directory and VirtualizationActive Directory and Virtualization
Active Directory and Virtualization
 
DevFest | Presentation | Final - Imran Roshan
DevFest | Presentation | Final - Imran RoshanDevFest | Presentation | Final - Imran Roshan
DevFest | Presentation | Final - Imran Roshan
 
Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptx
 
Top 3 reasons why you should run your Enterprise workloads on GKE
Top 3 reasons why you should run your Enterprise workloads on GKETop 3 reasons why you should run your Enterprise workloads on GKE
Top 3 reasons why you should run your Enterprise workloads on GKE
 
Google GCP-PCSE Certificate Is Your Best Choice
Google GCP-PCSE Certificate Is Your Best ChoiceGoogle GCP-PCSE Certificate Is Your Best Choice
Google GCP-PCSE Certificate Is Your Best Choice
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud Security
 
The Perimeter Is Dead
The Perimeter Is DeadThe Perimeter Is Dead
The Perimeter Is Dead
 
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
 
DCEU 18: Docker Enterprise Platform and Architecture
DCEU 18: Docker Enterprise Platform and ArchitectureDCEU 18: Docker Enterprise Platform and Architecture
DCEU 18: Docker Enterprise Platform and Architecture
 
Deploying Compliant Kubernetes: Real World Edge Cases
Deploying Compliant Kubernetes: Real World Edge CasesDeploying Compliant Kubernetes: Real World Edge Cases
Deploying Compliant Kubernetes: Real World Edge Cases
 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit Giri
 
12 Ways Not to get 'Hacked' your Kubernetes Cluster
12 Ways Not to get 'Hacked' your Kubernetes Cluster12 Ways Not to get 'Hacked' your Kubernetes Cluster
12 Ways Not to get 'Hacked' your Kubernetes Cluster
 
ACDKOCHI19 - Turbocharge Developer productivity with platform build on K8S an...
ACDKOCHI19 - Turbocharge Developer productivity with platform build on K8S an...ACDKOCHI19 - Turbocharge Developer productivity with platform build on K8S an...
ACDKOCHI19 - Turbocharge Developer productivity with platform build on K8S an...
 
Building A Cloud Security Strategy for Scale
Building A Cloud Security Strategy for ScaleBuilding A Cloud Security Strategy for Scale
Building A Cloud Security Strategy for Scale
 
GCP - Continuous Integration and Delivery into Kubernetes with GitHub, Travis...
GCP - Continuous Integration and Delivery into Kubernetes with GitHub, Travis...GCP - Continuous Integration and Delivery into Kubernetes with GitHub, Travis...
GCP - Continuous Integration and Delivery into Kubernetes with GitHub, Travis...
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
 
Evolution of security strategies in K8s environments.pdf
Evolution of security strategies in K8s environments.pdfEvolution of security strategies in K8s environments.pdf
Evolution of security strategies in K8s environments.pdf
 

Mais de Krishna-Kumar

Mais de Krishna-Kumar (20)

SODA Ambassadors & Community Ecosystem
SODA Ambassadors & Community EcosystemSODA Ambassadors & Community Ecosystem
SODA Ambassadors & Community Ecosystem
 
Open Source Building Career and Competency
Open Source Building Career and CompetencyOpen Source Building Career and Competency
Open Source Building Career and Competency
 
CCICI CIP 1.0 Testbed - Security access implementation and reference - v1.0
CCICI CIP 1.0 Testbed - Security access implementation and reference - v1.0CCICI CIP 1.0 Testbed - Security access implementation and reference - v1.0
CCICI CIP 1.0 Testbed - Security access implementation and reference - v1.0
 
Google Anthos - Azure Stack - AWS Outposts :Comparison
Google Anthos - Azure Stack - AWS Outposts :ComparisonGoogle Anthos - Azure Stack - AWS Outposts :Comparison
Google Anthos - Azure Stack - AWS Outposts :Comparison
 
Cloud Native Use Cases / Case Studies - KubeCon 2019 San Diego - RECAP
Cloud Native Use Cases / Case Studies - KubeCon 2019 San Diego - RECAPCloud Native Use Cases / Case Studies - KubeCon 2019 San Diego - RECAP
Cloud Native Use Cases / Case Studies - KubeCon 2019 San Diego - RECAP
 
Cloud interoperability and open standards for digital india open infrasummit
Cloud interoperability and open standards for digital india open infrasummitCloud interoperability and open standards for digital india open infrasummit
Cloud interoperability and open standards for digital india open infrasummit
 
Kubernetes Application Deployment with Helm - A beginner Guide!
Kubernetes Application Deployment with Helm - A beginner Guide!Kubernetes Application Deployment with Helm - A beginner Guide!
Kubernetes Application Deployment with Helm - A beginner Guide!
 
KubeCon + CloudNativeCon Barcelona and Shanghai 2019 - Highlights
KubeCon + CloudNativeCon Barcelona and Shanghai 2019 - HighlightsKubeCon + CloudNativeCon Barcelona and Shanghai 2019 - Highlights
KubeCon + CloudNativeCon Barcelona and Shanghai 2019 - Highlights
 
Introduction to ieee standards development - Bangalore Section
Introduction to ieee standards development - Bangalore SectionIntroduction to ieee standards development - Bangalore Section
Introduction to ieee standards development - Bangalore Section
 
IEEE Standards Association - Introduction
IEEE Standards Association - IntroductionIEEE Standards Association - Introduction
IEEE Standards Association - Introduction
 
IoTShow.in Bangalore 2019 - a Recap on 'IoT and Edge' Talk.
IoTShow.in Bangalore 2019 - a Recap on 'IoT and Edge' Talk.IoTShow.in Bangalore 2019 - a Recap on 'IoT and Edge' Talk.
IoTShow.in Bangalore 2019 - a Recap on 'IoT and Edge' Talk.
 
Open Source Edge Computing Platforms - Overview
Open Source Edge Computing Platforms - OverviewOpen Source Edge Computing Platforms - Overview
Open Source Edge Computing Platforms - Overview
 
cncf overview and building edge computing using kubernetes
cncf overview and building edge computing using kubernetescncf overview and building edge computing using kubernetes
cncf overview and building edge computing using kubernetes
 
Evolution of containers to kubernetes
Evolution of containers to kubernetesEvolution of containers to kubernetes
Evolution of containers to kubernetes
 
My Ladakh Marathon Run 2018
My Ladakh Marathon Run 2018My Ladakh Marathon Run 2018
My Ladakh Marathon Run 2018
 
Now yoga - a study on where why what how
Now yoga  - a study on where why what howNow yoga  - a study on where why what how
Now yoga - a study on where why what how
 
CNCF Introduction - Feb 2018
CNCF Introduction - Feb 2018CNCF Introduction - Feb 2018
CNCF Introduction - Feb 2018
 
KubeCon USA 2017 brief Overview - from Kubernetes meetup Bangalore
KubeCon USA 2017 brief Overview - from Kubernetes meetup BangaloreKubeCon USA 2017 brief Overview - from Kubernetes meetup Bangalore
KubeCon USA 2017 brief Overview - from Kubernetes meetup Bangalore
 
Yoga for confused IT engineer
Yoga for confused IT engineerYoga for confused IT engineer
Yoga for confused IT engineer
 
Cloud, Big Data, IoT, ML - together to build a real world use case!
Cloud, Big Data, IoT, ML - together to build a real world use case!Cloud, Big Data, IoT, ML - together to build a real world use case!
Cloud, Big Data, IoT, ML - together to build a real world use case!
 

Último

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 

Último (20)

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 

Google Cloud Container Security Quick Overview

  • 1. Google Cloud Container Security QuickView Lightning talk of 5-10 minutes.... Krishna Kumar – CNCF Ambassador
  • 2. Google Cloud Security – Console View – First Look https://console.cloud.google.com/
  • 3. Google Compute Engine Security  Google cloud Identity service - IAM  IAM Policies & Organization level policies  Effectively design the hierarchy  Apply Leave privileaged access policy mode  Create security groups with conceptual roles instead randiomly creating users and groups  Like One top account create/set polciies & service acconts only and the other accounts apply it.  Unmanaged credentials night mare! Key Management Services (KMS)  VPC network can be managed/deleted as needed  Rootkits & Bootkits for VM hardening  Tools – AuditLogs, CSCC, KMS Resource Hierarchy in general
  • 4. Google Container Security Infrastructure Security Software Supply Chain Security Run time Security Cloud IAM, RBAC Google container Registry Stackdriver – monitoring, Attack profiles Compliance Certifications Security Vulnerability Scanning Anomolous detection by third party products like Twistlocks, acqua, sysdig Cloud Audit Logging Secure base images Cloud SCC Container Optimized minimal OS, Node auto upgrade Regular builds Isolation gVisor sandbox Network policy, Private clusters, Shared VPC Deployment policies, Binary authorization Runtime detection – host, network, workload, Boot
  • 5. Google Kubernetes Engine Security Managed Security by Google ● Control plane security – Google does the control plane management (Mater VM, Scheduler, Cntroll manager, API server, etcd, CA, IAM, logging to stackdriver,) & Patching the contol plane. ● Node security – Google handles K8s comoponents, COS (Chromium OS), logging & monitoring. Autoupgarde & security patches automatically rolled out. Manage base images. – Live migration: Node auto upgrade is like adding new node and drain the work from old. ● Workloads: User need to secure workloads. Protect the secret with Cloud KMS or KMS plugin (Vault).
  • 6. Hardening GKE ● Disable the Kubernetes web UI (Dashboard) ● Restrict Cluster discovery RBAC permission & binary authentication ● Restrict Traffic Among Pods with a Network Policy & Pod security policy ● Use Least Privilege Service Accounts for your Nodes ● Restrict your Node Service Account Scopes & Client Authentication Methods ● Protect node metadata & Automatically upgrade nodes ● Authorized networks & meta data concealment ● Google Container Registry (GCR) Vulnerability Scanning ● Third party container security. ● Read secuity bulletins – Vulnerabilties and solutiond
  • 7. GKE Istio Security Istio, a service mesh implementation, on GKE is an add-on. ● The version of Istio installed is tied to the GKE version, and you will not be able to update them independently. ● Pilot: ● Istio Auth ensures that services with sensitive data can only be accessed ● Istio RBAC provides namespace-level, service-level, and method-level access control ● Mixer: ● Istio config policy on server side not client side. ● Citadel: ● MutualTLS authentication - both service-to-service and end-user-to-service ● Automates key and certificate generation, distribution, rotation, and revocation.
  • 8. Anthos Security ● Single pane of glass visibility across all clusters ● Service-centric view of your infrastructure ● Configuration management & Compliance centralized ● Istio providing in-cluster mTLS and certificate management. ● 3rd party marketplace Hybrid cloud solutions: Anthos relies on Google Kubernetes Engine (GKE) and GKE On-Prem to manage Kubernetes installations in the environments
  • 9. Google Cloud Partner Security ● Splunk ● Palo alto Networks ● Checkpoint ● F5 ● Brocade ● Nginx ● Symantec ● Cisco ● Hashicorp ● Acqua ● Blackduck ● Twistlock ● Stackrox ● & more...... With 3rd party providers, GCP Protects a wide variety of hybrid cloud solutions and data.