Defending against attacks
In the previous section, we talk about a few ways of detecting crypto-mining activities. In this section, we will talk about defending against attacks in general by securing Kubernetes clusters. So, this involves more than just defending against a particular attack, but defending against all kinds of attacks. The four major defense areas are Kubernetes cluster provisioning, build, deployment, and runtime. First, let's talk about securing Kubernetes cluster provisioning.
Securing Kubernetes cluster provisioning
There are multiple ways to provision Kubernetes clusters such as kops
and kubeadm
. No matter which tool you use to provision a cluster, each Kubernetes component needs to be configured securely. Use kube-bench
to benchmark your Kubernetes cluster and improve the security configurations. Make sure that RBAC is enabled, the --anonymous-auth
flag is disabled, network connections are encrypted, and so on. The following are the key areas we covered...