SlideShare a Scribd company logo
©2018 Lacework, Inc. Confidential and Proprietary.
©2018 Lacework, Inc. Confidential and Proprietary.
©2018 Lacework, Inc. Confidential and Proprietary. 3
Automating Cloud Security at Scale
©2018 Lacework, Inc. Confidential and Proprietary. 4
Lacework Polygraph
Threat Intelligence
and API’s
Alerting
SIEM
SOC
InvestigationCompliance DetectionVisibility
Cloud
Infrastructure
Workloads Accounts
VMs ContainersFilesApps Insiders Config APIs
Use cases
Lacework Security Platform for Cloud
©2018 Lacework, Inc. Confidential and Proprietary.
• Networking
• Redundancy
• Autoscaling
• Provisioning
• Storage
• Alerting
©2018 Lacework, Inc. Confidential and Proprietary.
©2018 Lacework, Inc. Confidential and Proprietary.
Do believe the hype!
Never heard of it
Looking into
it
M
igration planned
M
igration
done
W
eshould
secureit!
©2018 Lacework, Inc. Confidential and Proprietary.
ku · ber · net · es
co ·nun ·drum
Speed
&
Scale
Secure
&
Safe
©2018 Lacework, Inc. Confidential and Proprietary.
The Firewall is the
security!
Zero-Trust for all
Window of
Opportunity
©2018 Lacework, Inc. Confidential and Proprietary.
Monocultures are hard to secure!
©2018 Lacework, Inc. Confidential and Proprietary.
©2018 Lacework, Inc. Confidential and Proprietary.
Hunting Examples with Shodan
©2018 Lacework, Inc. Confidential and Proprietary.
Demo of Shodan
©2018 Lacework, Inc. Confidential and Proprietary.
©2018 Lacework, Inc. Confidential and Proprietary.
Container Risks and Threats
©2018 Lacework, Inc. Confidential and Proprietary.
Container Risks and Threats
©2018 Lacework, Inc. Confidential and Proprietary.
K8’s is the Leader
©2018 Lacework, Inc. Confidential and Proprietary.
Oh my, HealthZ RCE
©2018 Lacework, Inc. Confidential and Proprietary.
Risks and Threats
• Full remote administration
• Information discovery
• Deploy Images
• Delete Pod’s
• Deploy decoys
• Use your imagination
• Information Disclosure on targets with invalid
certificates
• Full RCE (https://www.shodan.io/search?query=healthz+probe)
©2018 Lacework, Inc. Confidential and Proprietary.
Recommendations
• Regardless of network policy, use MFA for all access;
• Apply strict controls to network access, especially for UI and API ports;
• Use SSL for all servers and use valid certificates with proper expiration and
enforcement policies;
• Investigate VPN (bastion), reverse proxy or direct connect connections to
sensitive servers;
• Look into product and services such as Lacework in order to discover,
detect, prevent, and secure your container services.
• Build a pod security policy
• Configure your Kubernetes pods to run read-only file systems
• Restrict privilege escalation in Kubernetes
• Deploy RBAC Kubernetes
©2018 Lacework, Inc. Confidential and Proprietary.
Pod Security Policy : prevent running as root
source Bitnami
©2018 Lacework, Inc. Confidential and Proprietary.
Pod Security Policy
source Bitnami
$kubectl get psp
©2018 Lacework, Inc. Confidential and Proprietary.
Pod Security Policy: prevent pods from accessing host ports
source Bitnami
©2018 Lacework, Inc. Confidential and Proprietary.
Pod Security Policy: prevent access to certain
volume types
source Bitnami
©2018 Lacework, Inc. Confidential and Proprietary.
Containers Security in Polygraph
25
©2018 Lacework, Inc. Confidential and Proprietary.
Automating Cloud
Security at Scale
26

More Related Content

PPTX
Containers At-Risk: A Review of 21,000 Cloud Environments
PPTX
Lacework Kubernetes Meetup | August 28, 2018
PPTX
Lacework Overview: Security Redefined for Cloud Scale
PPTX
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
PPTX
CipherCloud Technology Overview: Tokenization
PPTX
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
PPTX
Security Observability for Cloud Based Applications
PDF
Intelligent Cybersecurity for the Real World
Containers At-Risk: A Review of 21,000 Cloud Environments
Lacework Kubernetes Meetup | August 28, 2018
Lacework Overview: Security Redefined for Cloud Scale
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
CipherCloud Technology Overview: Tokenization
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
Security Observability for Cloud Based Applications
Intelligent Cybersecurity for the Real World

What's hot (19)

PPTX
Cloud Security 101 (Webinar Deck)
PDF
Cisco Connect 2018 Singapore - Cisco CMX
PDF
Cisco Connect 2018 Singapore - The Network Intuitive
PDF
Cisco Connect 2018 Singapore - Cisco SD-WAN
PDF
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
PDF
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
PPTX
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
PPTX
Panther 101: Bootstrapping Your Cloud SIEM (Webinar Deck)
PDF
Cisco Connect 2018 Singapore - Cisco Incident Response Services
PPTX
Lacework | Top 10 Cloud Security Threats
PPTX
D3NY17 - Migrating to the Cloud
PPTX
New security solutions for next generation of IT
PPTX
Lacework AWS Security Week Presentation
PDF
Rethinking Application Security for cloud-native era
PDF
TechWiseTV Workshop: Encrypted Traffic Analytics
PDF
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
PPTX
Automating your AWS Security Operations
PPTX
Idc security roadshow may2015 Adrian Aron
PPTX
Lacework for AWS Security Overview
Cloud Security 101 (Webinar Deck)
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Panther 101: Bootstrapping Your Cloud SIEM (Webinar Deck)
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Lacework | Top 10 Cloud Security Threats
D3NY17 - Migrating to the Cloud
New security solutions for next generation of IT
Lacework AWS Security Week Presentation
Rethinking Application Security for cloud-native era
TechWiseTV Workshop: Encrypted Traffic Analytics
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Automating your AWS Security Operations
Idc security roadshow may2015 Adrian Aron
Lacework for AWS Security Overview
Ad

Similar to Kubernetes meetup k8s_aug_2019 (9)

PDF
BlueHat v18 || Dep for the app layer - time for app sec to grow up
PDF
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
PDF
Securing Your Customers Data From Day One
PDF
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
PDF
AWS User Group November
PDF
AWS November meetup Slides
PPTX
Are you ready for a cloud pentest? AWS re:Inforce 2019
PDF
Mitigating techniques
PDF
Prisma Cloud - CyberTech ID Forum 24.pdf
BlueHat v18 || Dep for the app layer - time for app sec to grow up
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Securing Your Customers Data From Day One
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
AWS User Group November
AWS November meetup Slides
Are you ready for a cloud pentest? AWS re:Inforce 2019
Mitigating techniques
Prisma Cloud - CyberTech ID Forum 24.pdf
Ad

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
cuic standard and advanced reporting.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation theory and applications.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Electronic commerce courselecture one. Pdf
PPT
Teaching material agriculture food technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Dropbox Q2 2025 Financial Results & Investor Presentation
Programs and apps: productivity, graphics, security and other tools
cuic standard and advanced reporting.pdf
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
MYSQL Presentation for SQL database connectivity
Encapsulation theory and applications.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Reach Out and Touch Someone: Haptics and Empathic Computing
sap open course for s4hana steps from ECC to s4
Review of recent advances in non-invasive hemoglobin estimation
Big Data Technologies - Introduction.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Advanced methodologies resolving dimensionality complications for autism neur...
Empathic Computing: Creating Shared Understanding
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Electronic commerce courselecture one. Pdf
Teaching material agriculture food technology

Kubernetes meetup k8s_aug_2019

  • 1. ©2018 Lacework, Inc. Confidential and Proprietary.
  • 2. ©2018 Lacework, Inc. Confidential and Proprietary.
  • 3. ©2018 Lacework, Inc. Confidential and Proprietary. 3 Automating Cloud Security at Scale
  • 4. ©2018 Lacework, Inc. Confidential and Proprietary. 4 Lacework Polygraph Threat Intelligence and API’s Alerting SIEM SOC InvestigationCompliance DetectionVisibility Cloud Infrastructure Workloads Accounts VMs ContainersFilesApps Insiders Config APIs Use cases Lacework Security Platform for Cloud
  • 5. ©2018 Lacework, Inc. Confidential and Proprietary. • Networking • Redundancy • Autoscaling • Provisioning • Storage • Alerting
  • 6. ©2018 Lacework, Inc. Confidential and Proprietary.
  • 7. ©2018 Lacework, Inc. Confidential and Proprietary. Do believe the hype! Never heard of it Looking into it M igration planned M igration done W eshould secureit!
  • 8. ©2018 Lacework, Inc. Confidential and Proprietary. ku · ber · net · es co ·nun ·drum Speed & Scale Secure & Safe
  • 9. ©2018 Lacework, Inc. Confidential and Proprietary. The Firewall is the security! Zero-Trust for all Window of Opportunity
  • 10. ©2018 Lacework, Inc. Confidential and Proprietary. Monocultures are hard to secure!
  • 11. ©2018 Lacework, Inc. Confidential and Proprietary.
  • 12. ©2018 Lacework, Inc. Confidential and Proprietary. Hunting Examples with Shodan
  • 13. ©2018 Lacework, Inc. Confidential and Proprietary. Demo of Shodan
  • 14. ©2018 Lacework, Inc. Confidential and Proprietary.
  • 15. ©2018 Lacework, Inc. Confidential and Proprietary. Container Risks and Threats
  • 16. ©2018 Lacework, Inc. Confidential and Proprietary. Container Risks and Threats
  • 17. ©2018 Lacework, Inc. Confidential and Proprietary. K8’s is the Leader
  • 18. ©2018 Lacework, Inc. Confidential and Proprietary. Oh my, HealthZ RCE
  • 19. ©2018 Lacework, Inc. Confidential and Proprietary. Risks and Threats • Full remote administration • Information discovery • Deploy Images • Delete Pod’s • Deploy decoys • Use your imagination • Information Disclosure on targets with invalid certificates • Full RCE (https://www.shodan.io/search?query=healthz+probe)
  • 20. ©2018 Lacework, Inc. Confidential and Proprietary. Recommendations • Regardless of network policy, use MFA for all access; • Apply strict controls to network access, especially for UI and API ports; • Use SSL for all servers and use valid certificates with proper expiration and enforcement policies; • Investigate VPN (bastion), reverse proxy or direct connect connections to sensitive servers; • Look into product and services such as Lacework in order to discover, detect, prevent, and secure your container services. • Build a pod security policy • Configure your Kubernetes pods to run read-only file systems • Restrict privilege escalation in Kubernetes • Deploy RBAC Kubernetes
  • 21. ©2018 Lacework, Inc. Confidential and Proprietary. Pod Security Policy : prevent running as root source Bitnami
  • 22. ©2018 Lacework, Inc. Confidential and Proprietary. Pod Security Policy source Bitnami $kubectl get psp
  • 23. ©2018 Lacework, Inc. Confidential and Proprietary. Pod Security Policy: prevent pods from accessing host ports source Bitnami
  • 24. ©2018 Lacework, Inc. Confidential and Proprietary. Pod Security Policy: prevent access to certain volume types source Bitnami
  • 25. ©2018 Lacework, Inc. Confidential and Proprietary. Containers Security in Polygraph 25
  • 26. ©2018 Lacework, Inc. Confidential and Proprietary. Automating Cloud Security at Scale 26