SlideShare a Scribd company logo
A DevOps State of Mind:
Continuous Security with Kubernetes
Chris Van Tuin
Red Hat
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.com
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
“Only the paranoid survive”
- Andy Grove, 1996
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Static &

Planned
Dynamic & 

Policy Driven
ExecutionInnovation
Old New
ExecutionInnovation
THE CHALLENGE: 

ENABLE INNOVATION AT SPEED, WHILE
EXECUTING AT SCALE WITH EFFICIENCY
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
SECURITY MUST EVOLVE & KEEP UP
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Applications &
devices outside of
IT control
Cloud
computing
Software-defined
infrastructure
Dissolving
security
perimeter
Menacing threat
landscape
TRADITIONAL NETWORK-BASED DEFENSES ARE NO LONGER ENOUGH
SECURING THE ENTERPRISE IS HARDER THAN EVER
The way we develop, deploy and manage IT is changing dramatically
led by DevOps, Cloud Native Applications, and Hybrid Cloud
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
DEVSECOPS
+ +
Security
DEV
QA OPS
Culture Process Technology
Linux + Containers
IaaS
Orchestration
CI/CD
Source Control Management
Collaboration
Build and Artifact Management
Testing
Frameworks
Cloud Native Applications
Hybrid Cloud
OpenSource
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
DEVSECOPS
Continuous
Security
Improvement
Process
Optimization
Security
Automation
Dev QA Prod
Reduce Risks, Lower Costs, Speed Delivery, Speed Reaction
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
LAPTOP
Container
Application
OS dependencies
Guest VM
LINUX
BARE METAL
Container
Application
OS dependencies
LINUX
VIRTUALIZATION
Container
Application
OS dependencies
Virtual Machine
LINUX
PRIVATE CLOUD
Container
Application
OS dependencies
Virtual Machine
LINUX
PUBLIC CLOUD
Container
Application
OS dependencies
Virtual Machine
LINUX
CONTAINERS - Build Once, Deploy Anywhere
Reducing Risk and Improving Security with Improved Consistency
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
BARE METAL VIRTUAL PRIVATE CLOUD PUBLIC CLOUD
Security Platform
AUTOMATION
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Web Database
role=web role=db role=web
replicas=1, 

role=db
replicas=2, 

role=web
ORCHESTRATION
Deployment, Declarative
Pods
Nodes
Services
Controller
Manager
&
Data Store
(etcd)
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Web Database
replicas=1, 

role=db
replicas=2, 

role=web
HEALTH CHECK
Pods
Nodes
Services
role=web role=db role=web
Controller
Manager
&
Data Store
(etcd)
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Pods
Nodes
Services
Web Database
replicas=1, 

role=dbreplicas=3 

role=web
AUTO-SCALE
50% CPU
role=web role=db role=web role=web
Controller
Manager
&
Data Store
(etcd)
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Network
isolation
API & Platform
access
Federated
clusters
Storage
{}
CI/CD
Monitoring &
Logging
BuildsImages
SECURING YOUR CONTAINER ENVIRONMENT
Container
hostRegistry
CONTAINER IMAGES
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
docker.io
RegistryPrivate
Registry
FROM fedora:1.0
CMD echo “Hello”
Build file
Physical, Virtual, Cloud
Container
Image
Container
Instance
Build RunShip
CONTAINER WORKFLOW
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
JAR CONTAINER IMAGE
Application Application
Language runtimes
OS dependencies
1.2/latest
1.1
CONTAINER IMAGE
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Config Data
Kubernetes
configmaps
secrets
Container
image
Traditional 

data services,
Kubernetes 

persistent volumes
TREAT CONTAINERS AS IMMUTABLE
Application
Language runtimes
OS dependencies
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
•Authenticating authorship
•Non-repudiation
•Ensuring image integrity
CONTAINER IMAGE SIGNING
Validate what images and version are running
CONTAINER BUILDS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
A CONVERGED SOFTWARE 

SUPPLY CHAIN
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
• Treat build file as a Blueprint
• Version control build file
• Don’t login to build/configure
• Be explicit with versions, not latest
• Always list registry pulling FROM
• Specify USER, default is root
• Each Run creates a new layer
BUILD FILE BEST PRACTICES
FROM registry.redhat.com/rhel7
RUN groupadd -g 999 appuser && 
useradd -r -u 999 -g appuser appuser
USER appuser
CMD echo “Hello”
Build file
CONTAINER REGISTRY SECURITY
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
64% of official images in Docker Hub 

contain high priority security vulnerabilities
examples:
ShellShock (bash)
Heartbleed (OpenSSL)
Poodle (OpenSSL)
Source: Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities, Jayanth Gummaraju, Tarun Desikan, and Yoshio Turner, BanyanOps,
May 2015 (http://www.banyanops.com/pdf/BanyanOps-AnalyzingDockerHub-WhitePaper.pdf)
WHAT’S INSIDE THE CONTAINER MATTERS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
PRIVATE REGISTRY
CONTAINER HOST SECURITY
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Best Practices
• Don’t run as root
• If you must, 

limit Linux Capabilities
• Limit SSH Access
• Use namespaces
• Define resource quotas
• Enable logging
• Apply Security Errata
• Apply Security Context
and seccomp filters
• Run production 

unprivileged containers 

as read-only
http://blog.kubernetes.io/2016/08/security-best-practices-kubernetes-deployment.html
Kernel
Hardware (Intel, AMD) or Virtual Machine
Containers ContainersContainers
Unit File
Docker
Image
Container CLI
SYSTEMD
Cgroups Namespaces SELinux
Drivers seccomp Read Only mounts Capabilities
CONTAINER HOST SECURITY
CONTINUOUS INTEGRATION
WITH CONTAINERS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
SECURITY IMPLICATIONS
What’s inside matters…
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Security
CONTINUOUS INTEGRATION

WITH SECURITY SCAN
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
AUTOMATED SECURITY SCANNING with OpenSCAP
ReportsScan
SCAP Security
Guide
for RHEL
CCE-27002-5
Set Password Minimum
Length
Content
Scan physical servers, virtual machines, docker images and containers

for Security Policy Compliance (CCEs) and known Security Vulnerabilities (CVEs)
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
CONTINUOUS INTEGRATION + BUILDS
CONTINUOUS DELIVERY
WITH CONTAINERS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
CONTINUOUS DELIVERY WITH CONTAINERS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
CONTINUOUS DELIVERY DEPLOYMENT STRATEGIES
DEPLOYMENT STRATEGIES
• Recreate
• Rolling updates
• Blue / Green deployment
• Canary with A/B testing
RECREATE
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1 Version 1Version 1
Version 1.2
`
Tests / CI
RECREATE WITH DOWNTIME
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1 Version 1Version 1
Version 1.2
`
Tests / CI
RECREATE WITH DOWNTIME
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1.2 Version 1.2Version 1.2
RECREATE WITH DOWNTIME
Use Case
• Non-mission critical services
Cons
• Downtime
Pros
• Simple, clean
• No Schema incompatibilities
• No API versioning
ROLLING UPDATES
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1 Version 1Version 1
Version 1.2
`
Tests / CI
ROLLING UPDATES with ZERO DOWNTIME
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Deploy new version and wait until it’s ready…
Version 1 Version 1 V1.2
Health Check:
readiness probe
e.g. tcp, http, script
V1
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Each container/pod is updated one by one
Version 1.2
50%
Version 1 V1 V1.2
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Each container/pod is updated one by one
Version 1.2Version 1.2Version 1.2
100%
Use Case
• Horizontally scaled
• Backward compatible
API/data
• Microservices
Cons
• Require backward
compatible APIs/data
• Resource overhead
Pros
• Zero downtime
• Reduced risk, gradual
rollout w/health checks
• Ready for rollback
BLUE / GREEN DEPLOYMENT
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1
BLUE / GREEN DEPLOYMENT
Route
BLUE
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1
BLUE / GREEN DEPLOYMENT
Version 1.2
BLUE GREEN
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1 Tests / CI
BLUE / GREEN DEPLOYMENT
Version 1.2
BLUE GREEN
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1 Version 1.2
BLUE / GREEN DEPLOYMENT
Route
Version 1.2
BLUE GREEN
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1
BLUE / GREEN DEPLOYMENT
Rollback
Route
Version 1.2
BLUE GREEN
Use Case
• Self-contained micro
services (data)
Cons
• Resource overhead
• Data synchronization
Pros
• Low risk, never
change production
• No downtime
• Production like testing
• Rollback
RAPID INNOVATION &
EXPERIMENTATION
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
”only about 1/3 of ideas improve the metrics 

they were designed to improve.”

Ronny Kohavi, Microsoft (Amazon)
MICROSERVICES
RAPID INNNOVATION & EXPERIMENTATION
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
CONTINUOUS FEEDBACK LOOP
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
A/B TESTING USING CANARY DEPLOYMENTS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1.2Version 1
100%
Tests / CI
Version 1.2
Route
25% Conversion Rate ?! Conversion Rate
CANARY DEPLOYMENTS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
50% 50%
Version 1.2Version 1
Route
Version 1.2
25% Conversion Rate 30% Conversion Rate
CANARY DEPLOYMENTS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
25% Conversion Rate
100%
Version 1 Version 1.2
Route
Version 1.2
30% Conversion Rate
CANARY DEPLOYMENTS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1.2Version 1
100%
Route
Rollback
25% Conversion Rate 20% Conversion Rate
CANARY DEPLOYMENTS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Network
isolation
API & Platform
access
Federated
clusters
Storage
{}
CI/CD
Monitoring &
Logging
ImagesBuilds
Container
hostRegistry
SECURING YOUR CONTAINER ENVIRONMENT
NETWORK SECURITY
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Network Namespace 

provides resource isolation
NETWORK ISOLATION
Multi-Environment Multi-Tenant
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
NETWORK POLICY
example: 

all pods in namespace ‘project-a’ allow traffic 

from any other pods in the same namespace.”
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Kubernetes 

Logical Network Model
NETWORK SECURITY
• Kubernetes uses a flat SDN model
• All pods get IP from same CIDR
• And live on same logical network
• Assumes all nodes communicate

Traditional 

Physical Network Model
• Each layer represents a Zone with

increased trust - DMZ > App > DB,

interzone flow generally one direction
• Intrazone traffic generally unrestricted
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
NETWORK SECURITY MODELS
Co-Existence Approaches
One Cluster
Multiple Zones
Kubernete Cluster
Physical Compute 

isolation based on 

Network Zones
Kubernete Cluster
One Cluster
Per Zone
Kubernete Cluster B
Kubernete Cluster A
Kubernetes Cluster B
C
D
https://blog.openshift.com/openshift-and-network-security-zones-coexistence-approaches/
MONITORING & LOGGING
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
KUBERNETES MONITORING CONSIDERATIONS
Kubernetes*
Container*
Host
Cluster services, services, pods, 

deployments metrics
Container native metrics
Traditional resource metrics
- cpu, memory, network, storage
prometheus + grafana
kubernetes-state-metrics
probes
Stack Metrics Tool
node-exporter
kuberlet:cAdvisor
Application
Distributed applications
- traditional app metrics
- service discovery
- distributed tracing
prometheus + grafana
jaeger tracing
istio
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Aggregate platform and application log access via Kibana + Elasticsearch
LOGGING
STORAGE SECURITY
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Local Storage Quota Security Context Constraints
STORAGE SECURITY
Sometimes we can also have
storage isolation requirements: 

pods in a network zone must use
different storage endpoints 

than pods in other network
zones.
We can create one storage class
per storage endpoint and 

then control which storage
class(es) a project can use
API & PLATFORM ACCESS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Authentication
via
OAuth tokens and
SSL certificate
Authorization
via
Policy Engine
checks
User/Group
Defined Roles
API & PLATFORM ACCESS
FEDERATION
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Amazon East OpenStack
FEDERATED CLUSTERS
Roles & access management (in-dev)
WHAT’S NEXT
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Monitoring & Metrics
-prometheus (logs)
-grafana (visual)
Access Control
& usage policies
-mixr (policy decisions)
Encryption & Auth
-citadel
-service 2 service
-user auth
Traffic routing
- pilot
- circuit breaker
- a/b testing
- traffic mirroring
Fault injections
-envoy
corner cases: abort & delays
SERVICE MESH
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
OPERATORS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Deployment
Frequency
Lead
Time
Deployment

Failure Rate
Mean Time
to Recover
99.999
Service
Availability
DEVSECOPS METRICS
Compliance
Score
THANK YOU
linkedin: Chris Van Tuin
email: cvantuin@redhat.com
twitter: @chrisvantuin

More Related Content

PDF
Flight East 2018 Presentation–Continuous Integration––An Overview
PDF
Flight East 2018 Presentation–Black Duck at Docusign
PDF
Securing deployment pipeline
PDF
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PDF
Introduction to dev ops
PDF
Packaging tool options
PDF
Dev ops and safety critical systems
PDF
Integrating Black Duck into your Agile DevOps Environment
Flight East 2018 Presentation–Continuous Integration––An Overview
Flight East 2018 Presentation–Black Duck at Docusign
Securing deployment pipeline
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
Introduction to dev ops
Packaging tool options
Dev ops and safety critical systems
Integrating Black Duck into your Agile DevOps Environment

What's hot (20)

PDF
Connect Ops and Security with Flexible Web App and API Protection
PDF
Better Security Testing: Using the Cloud and Continuous Delivery
PPTX
Integrating security into Continuous Delivery
PPT
Code Quality - Security
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
PDF
Experience in teaching devops
PDF
Making the Transition from Suite to the Hub
PPTX
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
PDF
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
PPTX
The How and Why of Container Vulnerability Management
PPTX
Рабочие нагрузки Skype for business 2015 UC Lab
 
PDF
Devops security-An Insight into Secure-SDLC
PPTX
How to Get Started with DevSecOps
PDF
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
PPTX
How to go from waterfall app dev to secure agile development in 2 weeks
PDF
Building Security in Using CI
PDF
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
PDF
Safe and Secure Applications: Deploying in a Cloud or Multi-Cloud Environment
PPTX
Rapid software testing and conformance with static code analysis
PPTX
Are your DevOps and Security teams friends or foes?
Connect Ops and Security with Flexible Web App and API Protection
Better Security Testing: Using the Cloud and Continuous Delivery
Integrating security into Continuous Delivery
Code Quality - Security
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Experience in teaching devops
Making the Transition from Suite to the Hub
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
The How and Why of Container Vulnerability Management
Рабочие нагрузки Skype for business 2015 UC Lab
 
Devops security-An Insight into Secure-SDLC
How to Get Started with DevSecOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
How to go from waterfall app dev to secure agile development in 2 weeks
Building Security in Using CI
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Safe and Secure Applications: Deploying in a Cloud or Multi-Cloud Environment
Rapid software testing and conformance with static code analysis
Are your DevOps and Security teams friends or foes?
Ad

Similar to Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security with Kubernetes (20)

PDF
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
PDF
Securing the container DevOps pipeline by William Henry
PDF
Ten layers of container security for CloudCamp Nov 2017
PPTX
SDLC Using Docker for Fun and Profit
PDF
Docker in Production: How RightScale Delivers Cloud Applications
PDF
Anatomy of a Build Server Attack
PDF
Docker in the Enterprise
PDF
create auto scale jboss cluster with openshift
PPTX
Cloud Native Summit 2019 Summary
PDF
Why should developers care about container security?
PDF
Creating Microservices Application with IBM Cloud Private (ICP) - Container a...
PDF
Best practices in Deploying SUSE CaaS Platform v3
PDF
DevSecOps: The Open Source Way
PDF
Python Web Conference 2022 - Why should devs care about container security.pdf
PDF
Going Atomic with your Container Infrastructure
PDF
Thinking inside the box (shared)
PDF
Using Docker Developing and Deploying Software with Containers 1st Edition Ad...
PDF
Evolving Infrastructure and Management for Business Agility
PPTX
How do you eat a whale? cloud expo 2017
PPTX
Achieving DevSecOps Outcomes with Tanzu Advanced - Spanish
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
Securing the container DevOps pipeline by William Henry
Ten layers of container security for CloudCamp Nov 2017
SDLC Using Docker for Fun and Profit
Docker in Production: How RightScale Delivers Cloud Applications
Anatomy of a Build Server Attack
Docker in the Enterprise
create auto scale jboss cluster with openshift
Cloud Native Summit 2019 Summary
Why should developers care about container security?
Creating Microservices Application with IBM Cloud Private (ICP) - Container a...
Best practices in Deploying SUSE CaaS Platform v3
DevSecOps: The Open Source Way
Python Web Conference 2022 - Why should devs care about container security.pdf
Going Atomic with your Container Infrastructure
Thinking inside the box (shared)
Using Docker Developing and Deploying Software with Containers 1st Edition Ad...
Evolving Infrastructure and Management for Business Agility
How do you eat a whale? cloud expo 2017
Achieving DevSecOps Outcomes with Tanzu Advanced - Spanish
Ad

More from Synopsys Software Integrity Group (20)

PDF
Webinar–Segen oder Fluch?
PDF
Webinar–Mobile Application Hardening Protecting Business Critical Apps
PDF
Webinar–The 2019 Open Source Year in Review
PDF
Webinar–Best Practices for DevSecOps at Scale
PDF
Webinar–That is Not How This Works
PDF
Webinar–You've Got Your Open Source Audit Report–Now What?
PDF
Webinar–OWASP Top 10 for JavaScript for Developers
PDF
Webinar–The State of Open Source in M&A Transactions
PDF
Webinar–5 ways to risk rank your vulnerabilities
PDF
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
PDF
Webinar–Using Evidence-Based Security
PDF
Webinar–Delivering a Next Generation Vulnerability Feed
PDF
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
PDF
Webinar–What You Need To Know About Open Source Licensing
PDF
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
PDF
Webinar–Why All Open Source Scans Aren't Created Equal
PDF
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
PDF
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
PDF
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
PDF
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar–Segen oder Fluch?
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–The 2019 Open Source Year in Review
Webinar–Best Practices for DevSecOps at Scale
Webinar–That is Not How This Works
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–The State of Open Source in M&A Transactions
Webinar–5 ways to risk rank your vulnerabilities
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Webinar–Using Evidence-Based Security
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–What You Need To Know About Open Source Licensing
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar – Streamling Your Tech Due Diligence Process for Software Assets

Recently uploaded (20)

PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
System and Network Administraation Chapter 3
PDF
Digital Strategies for Manufacturing Companies
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Introduction to Artificial Intelligence
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
medical staffing services at VALiNTRY
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
ManageIQ - Sprint 268 Review - Slide Deck
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Odoo Companies in India – Driving Business Transformation.pdf
Upgrade and Innovation Strategies for SAP ERP Customers
CHAPTER 2 - PM Management and IT Context
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Which alternative to Crystal Reports is best for small or large businesses.pdf
System and Network Administraation Chapter 3
Digital Strategies for Manufacturing Companies
Design an Analysis of Algorithms I-SECS-1021-03
L1 - Introduction to python Backend.pptx
Operating system designcfffgfgggggggvggggggggg
Wondershare Filmora 15 Crack With Activation Key [2025
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Introduction to Artificial Intelligence
2025 Textile ERP Trends: SAP, Odoo & Oracle
Navsoft: AI-Powered Business Solutions & Custom Software Development
medical staffing services at VALiNTRY
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf

Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security with Kubernetes

  • 1. A DevOps State of Mind: Continuous Security with Kubernetes Chris Van Tuin Red Hat Chief Technologist, NA West / Silicon Valley cvantuin@redhat.com
  • 2. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co “Only the paranoid survive” - Andy Grove, 1996
  • 3. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Static &
 Planned Dynamic & 
 Policy Driven ExecutionInnovation Old New ExecutionInnovation THE CHALLENGE: 
 ENABLE INNOVATION AT SPEED, WHILE EXECUTING AT SCALE WITH EFFICIENCY
  • 4. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co SECURITY MUST EVOLVE & KEEP UP
  • 5. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Applications & devices outside of IT control Cloud computing Software-defined infrastructure Dissolving security perimeter Menacing threat landscape TRADITIONAL NETWORK-BASED DEFENSES ARE NO LONGER ENOUGH SECURING THE ENTERPRISE IS HARDER THAN EVER The way we develop, deploy and manage IT is changing dramatically led by DevOps, Cloud Native Applications, and Hybrid Cloud
  • 6. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co DEVSECOPS + + Security DEV QA OPS Culture Process Technology Linux + Containers IaaS Orchestration CI/CD Source Control Management Collaboration Build and Artifact Management Testing Frameworks Cloud Native Applications Hybrid Cloud OpenSource
  • 7. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co DEVSECOPS Continuous Security Improvement Process Optimization Security Automation Dev QA Prod Reduce Risks, Lower Costs, Speed Delivery, Speed Reaction
  • 8. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co LAPTOP Container Application OS dependencies Guest VM LINUX BARE METAL Container Application OS dependencies LINUX VIRTUALIZATION Container Application OS dependencies Virtual Machine LINUX PRIVATE CLOUD Container Application OS dependencies Virtual Machine LINUX PUBLIC CLOUD Container Application OS dependencies Virtual Machine LINUX CONTAINERS - Build Once, Deploy Anywhere Reducing Risk and Improving Security with Improved Consistency
  • 9. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co BARE METAL VIRTUAL PRIVATE CLOUD PUBLIC CLOUD Security Platform
  • 11. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Web Database role=web role=db role=web replicas=1, 
 role=db replicas=2, 
 role=web ORCHESTRATION Deployment, Declarative Pods Nodes Services Controller Manager & Data Store (etcd)
  • 12. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Web Database replicas=1, 
 role=db replicas=2, 
 role=web HEALTH CHECK Pods Nodes Services role=web role=db role=web Controller Manager & Data Store (etcd)
  • 13. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Pods Nodes Services Web Database replicas=1, 
 role=dbreplicas=3 
 role=web AUTO-SCALE 50% CPU role=web role=db role=web role=web Controller Manager & Data Store (etcd)
  • 14. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Network isolation API & Platform access Federated clusters Storage {} CI/CD Monitoring & Logging BuildsImages SECURING YOUR CONTAINER ENVIRONMENT Container hostRegistry
  • 16. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co docker.io RegistryPrivate Registry FROM fedora:1.0 CMD echo “Hello” Build file Physical, Virtual, Cloud Container Image Container Instance Build RunShip CONTAINER WORKFLOW
  • 17. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co JAR CONTAINER IMAGE Application Application Language runtimes OS dependencies 1.2/latest 1.1 CONTAINER IMAGE
  • 18. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Config Data Kubernetes configmaps secrets Container image Traditional 
 data services, Kubernetes 
 persistent volumes TREAT CONTAINERS AS IMMUTABLE Application Language runtimes OS dependencies
  • 19. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co •Authenticating authorship •Non-repudiation •Ensuring image integrity CONTAINER IMAGE SIGNING Validate what images and version are running
  • 21. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co A CONVERGED SOFTWARE 
 SUPPLY CHAIN
  • 22. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co • Treat build file as a Blueprint • Version control build file • Don’t login to build/configure • Be explicit with versions, not latest • Always list registry pulling FROM • Specify USER, default is root • Each Run creates a new layer BUILD FILE BEST PRACTICES FROM registry.redhat.com/rhel7 RUN groupadd -g 999 appuser && useradd -r -u 999 -g appuser appuser USER appuser CMD echo “Hello” Build file
  • 24. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co 64% of official images in Docker Hub 
 contain high priority security vulnerabilities examples: ShellShock (bash) Heartbleed (OpenSSL) Poodle (OpenSSL) Source: Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities, Jayanth Gummaraju, Tarun Desikan, and Yoshio Turner, BanyanOps, May 2015 (http://www.banyanops.com/pdf/BanyanOps-AnalyzingDockerHub-WhitePaper.pdf) WHAT’S INSIDE THE CONTAINER MATTERS
  • 25. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co PRIVATE REGISTRY
  • 27. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Best Practices • Don’t run as root • If you must, 
 limit Linux Capabilities • Limit SSH Access • Use namespaces • Define resource quotas • Enable logging • Apply Security Errata • Apply Security Context and seccomp filters • Run production 
 unprivileged containers 
 as read-only http://blog.kubernetes.io/2016/08/security-best-practices-kubernetes-deployment.html Kernel Hardware (Intel, AMD) or Virtual Machine Containers ContainersContainers Unit File Docker Image Container CLI SYSTEMD Cgroups Namespaces SELinux Drivers seccomp Read Only mounts Capabilities CONTAINER HOST SECURITY
  • 29. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co SECURITY IMPLICATIONS What’s inside matters…
  • 30. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Security CONTINUOUS INTEGRATION
 WITH SECURITY SCAN
  • 31. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co AUTOMATED SECURITY SCANNING with OpenSCAP ReportsScan SCAP Security Guide for RHEL CCE-27002-5 Set Password Minimum Length Content Scan physical servers, virtual machines, docker images and containers
 for Security Policy Compliance (CCEs) and known Security Vulnerabilities (CVEs)
  • 32. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co CONTINUOUS INTEGRATION + BUILDS
  • 34. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co CONTINUOUS DELIVERY WITH CONTAINERS
  • 35. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co CONTINUOUS DELIVERY DEPLOYMENT STRATEGIES DEPLOYMENT STRATEGIES • Recreate • Rolling updates • Blue / Green deployment • Canary with A/B testing
  • 37. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 Version 1Version 1 Version 1.2 ` Tests / CI RECREATE WITH DOWNTIME
  • 38. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 Version 1Version 1 Version 1.2 ` Tests / CI RECREATE WITH DOWNTIME
  • 39. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1.2 Version 1.2Version 1.2 RECREATE WITH DOWNTIME Use Case • Non-mission critical services Cons • Downtime Pros • Simple, clean • No Schema incompatibilities • No API versioning
  • 41. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 Version 1Version 1 Version 1.2 ` Tests / CI ROLLING UPDATES with ZERO DOWNTIME
  • 42. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Deploy new version and wait until it’s ready… Version 1 Version 1 V1.2 Health Check: readiness probe e.g. tcp, http, script V1
  • 43. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Each container/pod is updated one by one Version 1.2 50% Version 1 V1 V1.2
  • 44. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Each container/pod is updated one by one Version 1.2Version 1.2Version 1.2 100% Use Case • Horizontally scaled • Backward compatible API/data • Microservices Cons • Require backward compatible APIs/data • Resource overhead Pros • Zero downtime • Reduced risk, gradual rollout w/health checks • Ready for rollback
  • 45. BLUE / GREEN DEPLOYMENT
  • 46. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 BLUE / GREEN DEPLOYMENT Route BLUE
  • 47. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 BLUE / GREEN DEPLOYMENT Version 1.2 BLUE GREEN
  • 48. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 Tests / CI BLUE / GREEN DEPLOYMENT Version 1.2 BLUE GREEN
  • 49. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 Version 1.2 BLUE / GREEN DEPLOYMENT Route Version 1.2 BLUE GREEN
  • 50. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 BLUE / GREEN DEPLOYMENT Rollback Route Version 1.2 BLUE GREEN Use Case • Self-contained micro services (data) Cons • Resource overhead • Data synchronization Pros • Low risk, never change production • No downtime • Production like testing • Rollback
  • 52. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co ”only about 1/3 of ideas improve the metrics 
 they were designed to improve.”
 Ronny Kohavi, Microsoft (Amazon) MICROSERVICES RAPID INNNOVATION & EXPERIMENTATION
  • 53. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co CONTINUOUS FEEDBACK LOOP
  • 54. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co A/B TESTING USING CANARY DEPLOYMENTS
  • 55. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1.2Version 1 100% Tests / CI Version 1.2 Route 25% Conversion Rate ?! Conversion Rate CANARY DEPLOYMENTS
  • 56. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co 50% 50% Version 1.2Version 1 Route Version 1.2 25% Conversion Rate 30% Conversion Rate CANARY DEPLOYMENTS
  • 57. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co 25% Conversion Rate 100% Version 1 Version 1.2 Route Version 1.2 30% Conversion Rate CANARY DEPLOYMENTS
  • 58. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1.2Version 1 100% Route Rollback 25% Conversion Rate 20% Conversion Rate CANARY DEPLOYMENTS
  • 59. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Network isolation API & Platform access Federated clusters Storage {} CI/CD Monitoring & Logging ImagesBuilds Container hostRegistry SECURING YOUR CONTAINER ENVIRONMENT
  • 61. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Network Namespace 
 provides resource isolation NETWORK ISOLATION Multi-Environment Multi-Tenant
  • 62. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co NETWORK POLICY example: 
 all pods in namespace ‘project-a’ allow traffic 
 from any other pods in the same namespace.”
  • 63. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Kubernetes 
 Logical Network Model NETWORK SECURITY • Kubernetes uses a flat SDN model • All pods get IP from same CIDR • And live on same logical network • Assumes all nodes communicate
 Traditional 
 Physical Network Model • Each layer represents a Zone with
 increased trust - DMZ > App > DB,
 interzone flow generally one direction • Intrazone traffic generally unrestricted
  • 64. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co NETWORK SECURITY MODELS Co-Existence Approaches One Cluster Multiple Zones Kubernete Cluster Physical Compute 
 isolation based on 
 Network Zones Kubernete Cluster One Cluster Per Zone Kubernete Cluster B Kubernete Cluster A Kubernetes Cluster B C D https://blog.openshift.com/openshift-and-network-security-zones-coexistence-approaches/
  • 66. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co KUBERNETES MONITORING CONSIDERATIONS Kubernetes* Container* Host Cluster services, services, pods, 
 deployments metrics Container native metrics Traditional resource metrics - cpu, memory, network, storage prometheus + grafana kubernetes-state-metrics probes Stack Metrics Tool node-exporter kuberlet:cAdvisor Application Distributed applications - traditional app metrics - service discovery - distributed tracing prometheus + grafana jaeger tracing istio
  • 67. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Aggregate platform and application log access via Kibana + Elasticsearch LOGGING
  • 69. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Local Storage Quota Security Context Constraints STORAGE SECURITY Sometimes we can also have storage isolation requirements: 
 pods in a network zone must use different storage endpoints 
 than pods in other network zones. We can create one storage class per storage endpoint and 
 then control which storage class(es) a project can use
  • 70. API & PLATFORM ACCESS
  • 71. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Authentication via OAuth tokens and SSL certificate Authorization via Policy Engine checks User/Group Defined Roles API & PLATFORM ACCESS
  • 73. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Amazon East OpenStack FEDERATED CLUSTERS Roles & access management (in-dev)
  • 75. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Monitoring & Metrics -prometheus (logs) -grafana (visual) Access Control & usage policies -mixr (policy decisions) Encryption & Auth -citadel -service 2 service -user auth Traffic routing - pilot - circuit breaker - a/b testing - traffic mirroring Fault injections -envoy corner cases: abort & delays SERVICE MESH
  • 76. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co OPERATORS
  • 77. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Deployment Frequency Lead Time Deployment
 Failure Rate Mean Time to Recover 99.999 Service Availability DEVSECOPS METRICS Compliance Score
  • 78. THANK YOU linkedin: Chris Van Tuin email: cvantuin@redhat.com twitter: @chrisvantuin