Add a short blurb about wek8s and security

This commit is contained in:
Jerome Petazzoni
2019-05-24 22:13:52 -05:00
parent f3b9340528
commit b0aeac555d
3 changed files with 41 additions and 0 deletions

21
k8s/malicious-pod.yaml Normal file
View File

@@ -0,0 +1,21 @@
apiVersion: v1
kind: Pod
metadata:
name: malicious
spec:
volumes:
- name: slash
hostPath:
path: /
containers:
- image: alpine
name: alpine
securityContext:
privileged: true
command:
- sleep
- "1000000000"
volumeMounts:
- name: slash
mountPath: /hostfs
restartPolicy: Never

19
slides/wek8s/security.md Normal file
View File

@@ -0,0 +1,19 @@
## Security in the context of wek8s
- The wek8s dev clusters have permissive policies
(so that we can easily experiment and try things)
- This means that we need to be particularly careful about unknown sources
- Check the provenance of images, YAML bundles, Helm Charts, etc.:
- does it come from the website / documentation / repository of a trusted vendor?
- is it maintained; how often does it get updates?
- For images:
- is the source (Dockerfile or otherwise) available?
- are they checked by an automated vulnerability scanner?

View File

@@ -100,6 +100,7 @@ chapters:
- k8s/localkubeconfig.md
- k8s/accessinternal.md
- k8s/dashboard.md
- wek8s/security.md
- k8s/healthchecks.md
- k8s/helm.md
- k8s/create-chart.md