zoukankan      html  css  js  c++  java
  • Summary Checklist for Run-Time Kubernetes Security

    Here is a convenient checklist summary of the security protections to review

    for securing Kubernetes deployments during run-time. This list does not cover

    the build phase vulnerability scanning and registry protection requirements.

    PRE-PRODUCTION

    ❏ Use namespaces

    ❏ Restrict Linux capabilities

    ❏ Enable SELinux

    ❏ Utilize Seccomp

    ❏ Configure Cgroups

    ❏ Use R/O Mounts

    ❏ Use a minimal Host OS

    ❏ Update system patches

    ❏ Conduct security auditing and compliance checks with CIS benchmark tests

    RUN-TIME

    ❏ Enforce isolation by application / service

    ❏ Inspect network connections for application attacks

    ❏ Monitor containers for suspicious process or file system activity

    ❏ Protect worker nodes from host privilege escalations, suspicious processes or

    file system activity

    ❏ Capture packets for security events

    ❏ Quarantine or remediate compromised containers

    ❏ Scan containers & hosts for vulnerabilities

    ❏ Alert, log, and respond in real-time to security incidents

    ❏ Conduct security auditing and compliance checks with CIS benchmark tests

    KUBERNETES SYSTEM

    ❏ Review all RBACs

    ❏ Protect the API Server

    ❏ Restrict Kubelet permissions

    ❏ Secure external ports

    ❏ Whitelist non-authenticated services

    ❏ Limit/restrict console access

    ❏ Monitor system container connections and processes in production

  • 相关阅读:
    unity的#pragma strict,#pragma downcast等指令分享
    Unity3d 添加多相机后编译警告
    Invoke计时器
    unity3d UI自动适合屏幕分辨率
    实现卷轴效果的脚本
    .unity3d格式的导出与加载
    Linux 网络编程
    姿态解算基本完成,程序编写笔记
    验证网络上四元数的正确性
    2440 模拟IIC 可以读取 L3G4200D ,ADXL345
  • 原文地址:https://www.cnblogs.com/dhcn/p/10641498.html
Copyright © 2011-2022 走看看