Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Kubernetes Cluster Wide Security Policy Configuration

355 visualizaciones

Publicado el

Container meetup 4th March 2017, Bangalore

Publicado en: Tecnología
  • Sé el primero en comentar

Kubernetes Cluster Wide Security Policy Configuration

  1. 1. Kubernetes Pradipta Banerjee @pradipta_kr www.cloudgeekz.com
  2. 2. Kubernetes Components
  3. 3. Kubernetes Authentication and Authorization
  4. 4. Container Security Policies • What ? • Can the container process run as ‘root’ user ? • Can the user run a ‘privileged’ container ? • What ‘capabilities’ should be allowed for the container ? • … • How ? • How the cluster admin can enforce container security ? • Kubernetes provides Pod Security Policy for enforcing cluster wide security policies.
  5. 5. Example Policy Don’t allow process(es) inside the container to run as the ‘root’ user POD should meet the following criteria: • The POD container image(s) should have USER attribute defined OR • The POD YAML file should explicitly specify the non-root USER ID as part of securityContext noroot.yaml pod.yaml
  6. 6. References • https://kubernetes.io/docs/user-guide/pod-security-policy/ • cloudgeekz.com/1204/docker-cluster-kubernetes-policies.html • https://www.katacoda.com/bpradipt/scenarios/kubernetes- podsecuritypolicy

×