SlideShare a Scribd company logo
Shifting security to the left with kubernetes, azure, and istio
Shifting security to the left with kubernetes, azure, and istio
$whoami
What to Expect?
Why Shifting to the Left?
“DevOps is those set of cultural
norms and technology practices that
enable the fast flow of planned work
from, among others, development,
through tests into operations while
preserving world-class reliability,
operation and security. DevOps is
not about what you do, but what
your outcomes are.” (Gene Kim)
Products
The Three Ways of DevOps
So … DevSecOps? Guardrails!
Leaning in over Always Saying “No”
Data & Security Science
Open Contribution & Collaboration
Consumable Security Services with APIs over Mandated Security Controls & Paperwork
Business Driven Security Scores over Rubber Stamp Security
Red & Blue Team Exploit Testing
24x7 Proactive Security Monitoring over Reacting after being Informed of an Incident
Shared Threat Intelligence over Keeping Info to Ourselves
Compliance Operations over Clipboards & Checklists
Security is not an afterthought!
Approach: Red, Green, Refactor
Red: reproduce vulnerability
Green: fix vulnerability
Refactor: improve
Shifting security to the left with kubernetes, azure, and istio
Kubernetes Security
Kubernetes is Great!
Self-healing
Shifting security to the left with kubernetes, azure, and istio
“Kubernetes is insecure by design”
Kubernetes Security Practices
https://blog.sqreen.com/kubernetes-security-best-practices/
Shifting security to the left with kubernetes, azure, and istio
Practices for Containers
Mission: Limiting the Attack Surface
Public Image Repositories?
Yes, But … Only From Official Repositories
And … Build Your Own Images
mcr.microsoft.com
With Your Private Registry
Use Multi-Stage Builds
Your application doesn’t need most of the compiling tooling … SSH?
Non-Root Users
RUN adduser -D myuser
USER myuser
Sign Your Container Images
Content Trust
Only release candidates
export DOCKER_CONTENT_TRUST=1
docker build --disable-content-trust=false -t myacr.azurecr.io/myimage:v1 .
Run Scanners
https://github.com/quay/clair
Azure Security Centerhttps://github.com/docker/docker-bench-security
And many more: https://techbeacon.com/security/10-top-open-source-tools-docker-security
https://github.com/cilium/cilium
Practices for Kubernetes
Mission: Limiting the Attack Surface
Working with Namespaces
Secure Pod Access
Secrets
Kubernetes default:
Hashicorp
https://www.hashicorp.com/resources/ephemeral-database-
credentials-with-vault-and-terraform-at-bench-accounting
Managed Pod Identities
Managing Secrets with Azure Vault + FlexVol
https://thorsten-hans.com/azure-key-vault-flexvolume-for-kubernetes
Demo: Working with Secrets
Thorsten Hans post J
Security in Distributed Systems
Security in Distributed Systems
Service Mesh
A Sidecar Proxy within Pods
Service Mesh Traffic Overview
Service Mesh Options
Istio
Network of Services
Few / No Code Changes
Traffic Management
Encryption In-Transit
Metrics, Logs, Traces
Secure service-to-service
Istio Archirecture
Istio Security Overview
Istio Installation on AKS
istioctl
Helm
Istio Helm
Networking Policies
Services
Pods
Why? Tell Me More!
DenyAll traffic within the mesh
Block access to Instance Metadata service
https://ahmet.im/blog/kubernetes-network-policy/
Circuit Breaker
Circuit Breaker
maxConnections: 100
Demo: Security using Istio
What’s Next for Security
in Kubernetes?
You Can Only Go Deeper!
Homework
https://kubernetespodcast.com/episode/065-attacking-and-defending-kubernetes/
Takeaways!
Be mindful about Docker / Kubernetes defaults
least-privileged principle
Networking plays a big role in security
Thanks!!
https://github.com/christianhxc/security-kubernetes

More Related Content

PDF
Development Workflow in Kubernetes
PPTX
CollabDays 2020 Barcelona - Serverless Kubernetes with KEDA
PDF
利用K8S實現高可靠應用
PPTX
Leonard Austin (Ravelin) - DevOps in a Machine Learning World
PDF
Datadog- Monitoring In Motion
PDF
Cncf event driven autoscaling with keda
PDF
Containers and Developer Defined Data Centers - Evan Powell - Keynote in Bang...
PDF
Automation for Anyone at Nutanix NEXT 2017 US
Development Workflow in Kubernetes
CollabDays 2020 Barcelona - Serverless Kubernetes with KEDA
利用K8S實現高可靠應用
Leonard Austin (Ravelin) - DevOps in a Machine Learning World
Datadog- Monitoring In Motion
Cncf event driven autoscaling with keda
Containers and Developer Defined Data Centers - Evan Powell - Keynote in Bang...
Automation for Anyone at Nutanix NEXT 2017 US

What's hot (19)

PDF
Handle insane devices traffic using Google Cloud Platform - Andrea Ulisse - C...
PDF
Matt Chung (Independent) - Serverless application with AWS Lambda
PDF
容器革命的「利」與「必」
PDF
The evolving container landscape
PDF
Netflix Cloud Platform and Open Source
PDF
Digital Forensics and Incident Response in The Cloud
PDF
Netflix Container Scheduling and Execution - QCon New York 2016
PDF
Owain Perry (Just Giving) - Continuous Delivery of Windows Micro-Services in ...
PDF
Rohit yadav cloud stack internals
PDF
Managing add-ons across clusters
PPTX
Deploying Kubernetes on AWS Using Terraform
PDF
Microservices architecture pitfalls
PDF
利用K8S實現高可靠應用
PDF
Building a Distributed Build System at Google Scale
PDF
Netflix and Containers: Not A Stranger Thing
PDF
Monitoring Big Data Systems Done "The Simple Way" - Demi Ben-Ari - Codemotion...
PDF
Brendon Foxen (Channel 4) - Speeding up Software Delivery at Channel 4
PDF
Testing in a continuous delivery world - continuous delivery Amsterdam meetup
PPTX
Securing your Cloud Environment v2
Handle insane devices traffic using Google Cloud Platform - Andrea Ulisse - C...
Matt Chung (Independent) - Serverless application with AWS Lambda
容器革命的「利」與「必」
The evolving container landscape
Netflix Cloud Platform and Open Source
Digital Forensics and Incident Response in The Cloud
Netflix Container Scheduling and Execution - QCon New York 2016
Owain Perry (Just Giving) - Continuous Delivery of Windows Micro-Services in ...
Rohit yadav cloud stack internals
Managing add-ons across clusters
Deploying Kubernetes on AWS Using Terraform
Microservices architecture pitfalls
利用K8S實現高可靠應用
Building a Distributed Build System at Google Scale
Netflix and Containers: Not A Stranger Thing
Monitoring Big Data Systems Done "The Simple Way" - Demi Ben-Ari - Codemotion...
Brendon Foxen (Channel 4) - Speeding up Software Delivery at Channel 4
Testing in a continuous delivery world - continuous delivery Amsterdam meetup
Securing your Cloud Environment v2
Ad

Similar to Shifting security to the left with kubernetes, azure, and istio (20)

PDF
GDG SLK - Why should devs care about container security.pdf
PDF
Why should developers care about container security?
PPTX
Kubernetes and container security
PDF
Why Should Developers Care About Container Security?
PDF
ATO 2022 - Why should devs care about container security.pdf
PDF
Container Stranger Danger - Why should devs care about container security
PDF
Kubernetes 101 for_penetration_testers_-_null_mumbai
PPTX
What it feels like to live in a Security Enabled DevOps World
PDF
KubeHuddle NA 2023 - Why should devs care about container security - Eric Sma...
PPTX
Microsoft, Linux, Open Source, DevOps
PPTX
Container security Familiar problems in new technology
PDF
Securing Kubernetes Workloads
PDF
[muCon2017]DevSecOps: How to Continuously Integrate Security into DevOps
PDF
Python Web Conference 2022 - Why should devs care about container security.pdf
PPTX
DevOps with Kubernetes and Helm - OSCON 2018
PPTX
10 tips for Cloud Native Security
PPTX
Supply chain security - Develop quickly without inviting The Nefarious.pptx
PPTX
Hybrid - Seguridad en Contenedores v3.pptx
PDF
Security Patterns for Microservice Architectures - SpringOne 2020
PDF
Security Patterns for Microservice Architectures
GDG SLK - Why should devs care about container security.pdf
Why should developers care about container security?
Kubernetes and container security
Why Should Developers Care About Container Security?
ATO 2022 - Why should devs care about container security.pdf
Container Stranger Danger - Why should devs care about container security
Kubernetes 101 for_penetration_testers_-_null_mumbai
What it feels like to live in a Security Enabled DevOps World
KubeHuddle NA 2023 - Why should devs care about container security - Eric Sma...
Microsoft, Linux, Open Source, DevOps
Container security Familiar problems in new technology
Securing Kubernetes Workloads
[muCon2017]DevSecOps: How to Continuously Integrate Security into DevOps
Python Web Conference 2022 - Why should devs care about container security.pdf
DevOps with Kubernetes and Helm - OSCON 2018
10 tips for Cloud Native Security
Supply chain security - Develop quickly without inviting The Nefarious.pptx
Hybrid - Seguridad en Contenedores v3.pptx
Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures
Ad

More from Christian Melendez (20)

PDF
DevOps Is Not What You Have Been Told It Is
PDF
Diferencias entre DevOps y SRE
PDF
Bases de Datos en Kubernetes
PPTX
La Vida de un Desarrollador con Kubernetes y Azure
PPTX
Pipelines as Code en Azure DevOps
PDF
Building CI/CD Pipelines for Kubernetes
PPTX
7 Container Design Patterns
PPTX
Bots ¿Qué son? Y ¿Cómo hacer uno?
PPTX
Integracion y Entrega Continua con Docker para SQL Server
PPTX
AWS re:Invent 2017 re:Cap
PPTX
Optimizando imagenes con Multi Stage builds
PPTX
Arquitectura de Microservicios con .NET Core y Contenedores
PPTX
Arquitectura de Micro Servicios con ECS
PPTX
Aplicaciones Xamarin conectadas y desconectadas con Azure
PPTX
Mi Primer Bot - Bot Framework + Xamarin
PPTX
Azure Functions 101
PPTX
Docker en Azure
PPTX
AWS Lambda + Serverless Framework
PPTX
Docker Tools in Visual Studio and Azure
PPTX
SQL Server Cross Platform Portable con Docker
DevOps Is Not What You Have Been Told It Is
Diferencias entre DevOps y SRE
Bases de Datos en Kubernetes
La Vida de un Desarrollador con Kubernetes y Azure
Pipelines as Code en Azure DevOps
Building CI/CD Pipelines for Kubernetes
7 Container Design Patterns
Bots ¿Qué son? Y ¿Cómo hacer uno?
Integracion y Entrega Continua con Docker para SQL Server
AWS re:Invent 2017 re:Cap
Optimizando imagenes con Multi Stage builds
Arquitectura de Microservicios con .NET Core y Contenedores
Arquitectura de Micro Servicios con ECS
Aplicaciones Xamarin conectadas y desconectadas con Azure
Mi Primer Bot - Bot Framework + Xamarin
Azure Functions 101
Docker en Azure
AWS Lambda + Serverless Framework
Docker Tools in Visual Studio and Azure
SQL Server Cross Platform Portable con Docker

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Spectroscopy.pptx food analysis technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
KodekX | Application Modernization Development
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Big Data Technologies - Introduction.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Spectral efficient network and resource selection model in 5G networks
Unlocking AI with Model Context Protocol (MCP)
Spectroscopy.pptx food analysis technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Chapter 3 Spatial Domain Image Processing.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
KodekX | Application Modernization Development
Building Integrated photovoltaic BIPV_UPV.pdf
cuic standard and advanced reporting.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Big Data Technologies - Introduction.pptx
Approach and Philosophy of On baking technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Programs and apps: productivity, graphics, security and other tools
Spectral efficient network and resource selection model in 5G networks

Shifting security to the left with kubernetes, azure, and istio