December 4, 2019

215 words 2 mins read

Piloting Around the Rocks: Avoiding Threats in Kubernetes

Piloting Around the Rocks: Avoiding Threats in Kubernetes

Over three months in 2019, Trail of Bits completed the first-ever security review of Kubernetes, consisting of source review, dynamic testing, and threat modeling. One artifact, the threat model, lets …

Talk Title Piloting Around the Rocks: Avoiding Threats in Kubernetes
Speakers Robert Tonic (Security Engineer, Trail of Bits), Stefan Edwards (Principal Security Engineer, Trail of Bits)
Conference KubeCon + CloudNativeCon North America
Conf Tag
Location San Diego, CA, USA
Date Nov 15-21, 2019
URL Talk Page
Slides Talk Slides
Video

Over three months in 2019, Trail of Bits completed the first-ever security review of Kubernetes, consisting of source review, dynamic testing, and threat modeling. One artifact, the threat model, lets users understand the risks of any given feature or deployment. We’ll show attendees how to make the most of this invaluable resource.First, we’ll break down the architecture of Kubernetes into trust zones. These are security boundaries where controls should be enforced. Incorrectly implemented controls can result in catastrophic security failures.After we describe the trust zones, you’ll find the architectural issues are easy to identify. We’ll discuss a few! We’ll also situate vulnerabilities we found in our code review into each trust zone.Finally, we’ll teach you how to review your own Kubernetes environment using our threat model to get simple answers to your security questions.

comments powered by Disqus