ID | Topic | Remarks |
---|---|---|
01 | Minimize host OS footprint (reduce attack surface) | |
02 | Minimize IAM Roles | |
03 | Minimize external access to the network | |
04 | Appropritately use Kernel hardening tools such as AppArmor, Seccomp |
ID | Topic | Remarks |
---|---|---|
01 | Setup appropriate OS Leve security domains - PodSecurityPolicies, OPA, SecurityContext | |
02 | Manage Kubernetes Secrets | |
03 | Use Container runtime sandboxes - gvisor, kata containers | |
04 | Implement pod to pod encryption - mTLS |
ID | Topic | Remarks |
---|---|---|
01 | Minimize Base image footprint | |
02 | Whitelisting allowed image registry via ImagePolicyWebhook | |
03 | Use Static Analysis of user workloads (KubeSec) - Kubernetes Manifests and Docker files | |
04 | Use Static Analysis of user workloads (ConfTest) - Kubernetes Manifests and Docker files | |
05 | Scan Images for known Vulnerability (Trivy) |
ID | Topic | Remarks |
---|---|---|
01 | Runtime Security - Behaviour Analysis of Container and Hosts via Falco | |
02 | Runtime Security - Auditing | |
03 | Runtime Security - Immutable Containers |