November 11, 2019

209 words 1 min read

Fine-Grained Permissions in Kubernetes: Whats Missing, and How to Fix That

Fine-Grained Permissions in Kubernetes: Whats Missing, and How to Fix That

In this talk, we will walk through a number of common scenarios where Kubernetes lacks sufficient access control tools, or where access control is often not properly applied. For example, it is common …

Talk Title Fine-Grained Permissions in Kubernetes: Whats Missing, and How to Fix That
Speakers Vallery Lancey (Infrastructure Software Engineer, Lyft), Seth McCombs (Site Reliability Engineer, -)
Conference KubeCon + CloudNativeCon Europe
Conf Tag
Location Barcelona, Spain
Date May 19-23, 2019
URL Talk Page
Slides Talk Slides
Video

In this talk, we will walk through a number of common scenarios where Kubernetes lacks sufficient access control tools, or where access control is often not properly applied. For example, it is common for a team to own a subset of services in a namespace, yet RBAC permissions grant that team access to other pods within the namespace. We will demonstrate a number of solutions available for specific problems, such as pod network policies, the open policy agent, custom controllers that gate API functionality. We will also discuss problems with the namespace permission model, and possible alternatives. Namespaces create an arbitrary boundary around resources, which creates the need to then bridge those boundaries. We will demonstrate ideas for bridging namespace networks, and posix-style objection permissions within a namespace.

comments powered by Disqus