Security controls to configure and secure the OCP container
1. Basic Security Measures:
- Scanning Container images for Vulnerabilities.
- Enabling Role-Based Access Control (RBAC) Running Application Containers as non-root.
2. A Kubernetes cluster consists of many components like Control Panel, Master Nodes, Worker Nodes, Pods, and it will be secured by following native security controls:
- Securing Kubernetes Hosts - OOB to be customizable and user must turn on certain functionality to secure the cluster.
- Control Network Access to Sensitive Ports.
- Limit direct access to Kubernetes Nodes.
- Controlling Access to the Kubernetes API.
- Use Transport Layer Security - It will encrypt all traffic by default.
- API Authentication - It has inbuilt mechanism for API server authentication.
- APl Authorization - RBAC is a method of regulating access to network or cluster based on the roles of individual users within your organization.
- Restrict access to Etcd - etcd is critical component which stores information on state and secrets, it will be protected differently from the rest of the cluster using in-built mechanism.
- Control Access to the Kubelet - Kubelet exposes HTTPS endpoints, and it can be secured by enabling Kubelet authentication and authorization.
3. Ensure that only authorized images are used in your environment. In MAS 8 or MAS 9 point of view, it will fetch all images based on entitlement key.
- Use container registry and the use of an image scanner to identify vulnerabilities.
- Use minimal base images and avoid unnecessary components. Again, it always pulls images based on Entitlement Key.
- Implement continuous Security Vulnerabilities scanning.
- Access the privileges used by containers.
- Define audit policies.
Comments
Post a Comment