mirror of
https://github.com/nubenetes/awesome-kubernetes.git
synced 2026-03-05 11:10:43 +00:00
9.9 KiB
9.9 KiB
Security and DevSecOps. Container Security
- Introduction
- Kubernetes Threat Modelling
- Kubernetes Config Security Threats
- Multi-Level Security (MLS) vs Multi-Category Security (MCS). Make Secure Pipelines with Podman and Containers
- Project Calico
- Security Patterns for Microservice Architectures
- Anchore Container Security Solutions for DevSecOps
- GitHub security
- Databases in DMZ and Intranet
- Removing Credentials From Git Repo
- Pentesting
- Credential Managers
- GitOps Secret Management
- Serverless Security Best Practices
- Docker Images & Container Security
- Pod Security Policies
- Kubernetes Network Policies
- Books
Introduction
- fiercesw.com: DevOps vs DevSecOps
- devopszone.info: DevSecOps Explained
- linkedin: Dear Google, my data has left your building!
- snyk.io: The State of Open Source Security 2020
- managedsentinel.com: Executive View — Current and Future Cybersecurity Architecture On One Page
- Exploring the (lack of) security in a typical Docker and Kubernetes installation
Kubernetes Threat Modelling
Kubernetes Config Security Threats
- cncf.io: Identifying Kubernetes Config Security Threats: Pods Running as Root
- mirantis.com: Introduction to Istio Ingress: The easy way to manage incoming Kubernetes app traffic Leaving your cluster exposed can be risky. That's why you need Istio Ingress, which only exposes the part that handles incoming traffic & allows routing rules based on routes, headers, IP addresses and more.
Multi-Level Security (MLS) vs Multi-Category Security (MCS). Make Secure Pipelines with Podman and Containers
- Why you should be using Multi-Category Security (MCS) for your Linux containers
- Using Podman and Containers to make a more secure pipeline
Project Calico
- Project Calico Secure networking for the cloud native era
Security Patterns for Microservice Architectures
Anchore Container Security Solutions for DevSecOps
- Anchore Container image inspection and policy-based compliance
Secure Container Based CI/CD Workflows
Securing Kubernetes With Anchore
GitHub security
Databases in DMZ and Intranet
Removing Credentials From Git Repo
Pentesting
- forbes.com: DevOps Drives Pentesting Delivered As A Service
- emagined.com: How to conduct a penetration test
Credential Managers
keycloak
- keycloak.org Open Source Identity and Access Management For Modern Applications and Services
- Securing Kubernetes Apps with Keycloak and Gatekeeper
- Authorizing multi-language microservices with Louketo Proxy
Git Credential Manager Core
- Git Credential Manager Core GCM Core is a free, open-source, cross-platform credential manager for Git.
- Git Credential Manager Core: Building a universal authentication experience
GitOps Secret Management
HashiCorp Vault
- vaultproject.io Manage Secrets and Protect Sensitive Data. Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API.
- medium: Coding for Secrets Reliability with HashiCorp Vault
- hashicorp.com: Vault & Kubernetes: Better Together
- OpenShift Blogs:
- https://www.openshift.com/blog/managing-secrets-openshift-vault-integration
- https://www.openshift.com/blog/vault-integration-using-kubernetes-authentication-method
- https://www.openshift.com/blog/integrating-vault-with-legacy-applications
- https://www.openshift.com/blog/integrating-hashicorp-vault-in-openshift-4
- Vault Learning Resources: Vault 1.5 features and more
- medium: Securing K8s Ingress Traffic with HashiCorp Vault PKIaaS and JetStack Cert-Manager
CyberArk and Ansible
- ansible.com: Simplifying secrets management with CyberArk and Red Hat Ansible Automation Platform
- ansible.com: Automating Security with CyberArk and Red Hat Ansible Automation Platform
SOPS for Kubernetes
Alternatives
Serverless Security Best Practices
Docker Images & Container Security
- thehackernews.com: Docker Images Containing Cryptojacking Malware Distributed via Docker Hub
- sysdig.com: 12 Container image scanning best practices to adopt in production
- The Ten Commandments of Container Security
Pod Security Policies
- octetz.com: Setting Up Pod Security Policies By default, Kubernetes allows anything capable of creating a Pod to run a fairly privileged container that can compromise a system. Pod Security Policies protect clusters from privileged pods by ensuring the requester is authorised.
- infracloud.io: Kubernetes Pod Security Policies with Open Policy Agent In this blog post, you will learn about the Pod Security Policy admission controller. Then you will see how Open Policy Agent can implement Pod Security Policies.