Kubernetes平台比較:Red Hat OpenShift、SUSE Rancher及 Canonical Kubernetes
1.14.x 1.15.x 1.16.x 1.17.x 1.18.x 1.19.x 1.20.x 1.21.x Old version Older version, security fixes Older version, still maintained Latest version 雖然OpenShift可延伸於邊緣裝置執行,Red Hat並未針對邊緣運算提供專屬的輕0 码力 | 10 页 | 1.26 MB | 1 年前3Kubernetes安全求生指南
隨便Google就可找到好幾卡車的Kubernetes安全最佳實務/指南.... 6 ©2019 VMware, Inc. Kubernetes安全最佳實務 Kubernetes Security Best Practices ©2019 VMware, Inc. 7 關閉公開存取 (Disable public access) 實施角色型存取權控管 (Implement (Keep your Kubernetes version up to date) Kubernetes Security Best Practices Kubernetes安全性的最佳實務指導 資料來源: https://blog.sqreen.com/kubernetes-security-best-practices/ ©2019 VMware, Inc. 8 NIST在容器安全指南中揭露了五種容器應用最應關注的風險 (Worker Node) 5. 政策 (Policies) ©2019 VMware, Inc. 10 Use Cases: Security Architecture Guidance / Replacement for Checklist / Security Training OWASP CSVS – 對Docker容器應用開發/調度平台的控制措施 組織面 基礎架構 容器 調度管理0 码力 | 23 页 | 2.14 MB | 1 年前3Putting an Invisible Shield on Kubernetes Secrets
tokens • ssh keys etc. • Stored in etcd • distributed Key-Value data store • How about their security? • Default K8s setup • etcd contents not encrypted (only base64 encoded) • > K8s 1.7+ • at-rest scheme • DEK & KEK Motivation: K8s Secrets Protection • Performance & latency • Network • Security • DEK in the clear in memory • Secret in the clear in memory • kubeconfig in the clear in memory User access management => raw and extensive! ü Secrets management => crucial! • Financial-grade security [1] KubeCon China 2018: Node Operator: Kubernetes Node Management Made Simple - Joe Chen, Ant Financial0 码力 | 33 页 | 20.81 MB | 1 年前3秘钥管理秘钥Turtles all the way down - Securely managing Kubernetes Secrets
the way down Turtles all the way down Alex Tcherniakhovski Security Engineer, Google Cloud Maya Kaczorowski Security PM, Google Cloud @MayaKaczorowski Protecting secrets What’s a secret combination of a safe. If a safe combination is known to an adversary, the strongest safe provides no security against penetration. Similarly, poor key management may easily compromise strong algorithms.” {SECRET}DEK + {DEK}KEK Envelope Source for crypto notation: https://en.wikipedia.org/wiki/Security_protocol_notation KMS 1.10 Envelope Encryption Sequence Master kube-apiserver etcd kms-plugin0 码力 | 52 页 | 2.84 MB | 1 年前3用户界面State of the UI_ Leveraging Kubernetes Dashboard and Shaping its Future
集成第三方插件 2. Feature parity with kubectl 功能与kubectl保持一致 3. Multi-cluster management 多集群管理 4. Improved security 提高安全性 Top requested changes 1. Third-party plugins or integrations 集成第三方插件 Which third-party 有多重要? https://github.com/kubernetes/dashboard/issues /3256#issuecomment-437199403 4. Improved security “During the week of June 1st, 2018, [researchers] discovered more than 21,000 publicly facing Kubernetes represented more than 78% of all open IP's.” → Lacework: Container Security Research 4. Improved security bit.ly/securing-dashboard Securely running Dashboard is possible! “We operate0 码力 | 41 页 | 5.09 MB | 1 年前3多租户Kubernetes VM Solutions for Multi-Tenant Applications
KubeVirt RancherVM Kata Container Focus : deploy REAL vm (traditional vm app) Focus : container security Virtlet Virtlet is a Kubernetes runtime server which allows you to run VM workloads, based on scale. RancherVM Architecture RancherVM Networking Container Security gVisor NFV? Kata Container The speed of containers, the security of VMs https://github.com/kata-containers Kata Container Architecture0 码力 | 33 页 | 3.34 MB | 1 年前3Amazon Elastic Kubernetes Service (EKS) 初探秘
Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential 责任共担模型 Security in the Cloud Security of the Cloud © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved Inspector AWS KMS AWS Secrets Manager AWS WAF AWS IAM Amazon GuardDuty Amazon Macie AWS Security Hub AWS CloudHSM AWS Certificate Manager AWS CloudTrail host container dependencies code0 码力 | 39 页 | 1.83 MB | 1 年前3Kubernetes开源书 - 周立
gIgnoredDuringExecution: - labelSelector: matchExpressions: - key: security operator: In values: - S1 topologyKey: failure-domain podAffinityTerm: labelSelector: matchExpressions: - key: security operator: In values: - S2 topologyKey: kubernetes preferredDuringSchedulingIgnoredDuringExecution 。Pod Affinity规则表示,只有当相同Zone中的某个Node⾄少有⼀ 个已经运⾏的、具有key=security、value=S1的Label的Pod时,该Pod才能调度到Node上。 (更准确地说,Pod会运⾏ 在这样的Node N上:Node N具有带有 failure-domain.beta.kubernetes0 码力 | 135 页 | 21.02 MB | 1 年前3QCon北京2017/智能化运维/Self Hosted Infrastructure:以自动运维 Kubernetes 为例
Kubernetes Architecture Operating Kubernetes ● Installation ● Upgrade ● Healing ● Scaling ● Security ● Monitoring ● ... Installation - SSH - Install kubelet - $pkgmanager install kubelet - Install infrastructure Workload driven Automation driven Easy to manage: self driving approach (Today’s topic) Security focused Thank you! Xiang Li xiang.li@coreos.com0 码力 | 73 页 | 1.58 MB | 1 年前3可觀測性 (Observability) 在 Kubernetes Day2 Operation的考量與實踐
遷移到 / 使用 Kubernetes 時,面臨的最大挑戰是什麼? • In-house skills / manpower • Company culture • Tooling • Security & Compliance 10 Canonical (Ubuntu) – K8S Operation Survey @2021/Nov, 1300 受訪者 Click to edit Master 作負載策略的方法,以確保根據組織 圍繞安全性、合規性和其他最佳實踐 的策略配置 Kubernetes 和容器。 • Kubernetes-native monitoring and logging for security and availability • 中央管理面板必須包含強大的雲原 生環境監控功能 • Resource utilization tools • Kubernetes Day2 管理運營必須包0 码力 | 30 页 | 3.01 MB | 1 年前3
共 22 条
- 1
- 2
- 3
相关搜索词
Kubernetes平台比較RedHatOpenShiftSUSERancherCanonical安全求生指南PuttinganInvisibleShieldonSecretsKailunQinAntGroup秘钥管理TurtlesallthewaydownSecurelymanaging用户界面用户界面StateofUILeveragingDashboardandShapingitsFuture租户VMSolutionsforMultiTenantApplicationsAmazonElasticServiceEKS探秘开源周立QCon北京2017智能智能化运维SelfHostedInfrastructure自动为例可觀測性ObservabilityDay2Operation考量實踐