Enhancing OpenShift and Kubernetes Container Security for Business Critical Deployments
NEUVECTOR Container Security Kubernetes Docker OpenShift Leave a Comment
In this webinar from DevOps.com, Andrew Toth from Red Hat outlines typical threats and security measures to protect container deployments and will share information on built-in security features of OpenShift and Kubernetes. Glen Kosaka from NeuVector then presents how to enhance security for Kubernetes and OpenShift by using advanced Kubernetes container security features to improve visibility and protection in production.
An outline is provided below the video.
Here is an outline of the webinar:
Top attack targets during container application runtime
- Data (secrets exfiltration)
- Access (denial of service)
- Infrastructure (system destruction)
Classic attack vectors targeting containers
- Container breakouts
- Poor Tenant isolation
- Poisoned images
- Host OS exploits
- Kernel exploits
Top ways to increase container security
- Namespaces
- Linux capabilities
- SELinux
- Seccomp
- Cgroups
- R/O Mounts
- Use minimal Host OS
- Update system patches
- Use trusted images
- Use image security scanner
- Quarantine poisoned images
Container security best practices
- Use as many security layers as possible
- Restrict access to your platforms and images
- Minimize attack surface
- Apply Host OS and Kernel security patches
- Only run trusted up to date container images
- Run containers with the least privileges possible
- Use a container image security scanner
Security Enhanced Container Platform Ecosystem
- Red Hat OpenShift
- Red Hat Container Catalog
- Red Hat CloudForms
- Red Hat Satellite
- Red Hat Enterprise Linux Atomic Host
Security Automation for OpenShift and Kubernetes [09:15 ]
- Hyper Scale
- East-West Traffic Explosion
- Low Visibility
- Open Source Vulnerabilities
- Sophisticated Insider Attacks
Traditional Security: Blind To Container Attacks
- Zero-Day
- DDoS
- DirtyCow
- SQL injection
- DNS Tunneling
- WannaCry
- Privilege escalation
- Break out detection
OpenShift-Kubernetes Run-time Vulnerability Examples
- Unauthorized Connections: Detect at Layer 3 – 7
- Exploit Over Trusted IP/Ports: Detect at Layer 7
- Known Application Attacks: Detect at Layer 7
- Privilege Escalation: Detect in Pod / Host Process
- Data Exfiltration: Reverse Shell / Tunneling
- Unauthorized Egress/Ingress: Detect at Layer 3-7 for Non-Containerized Workloads
NeuVector OpenShift & Kubernetes Container Security Automation
- Automatic Deployment & Updates
- Continuous Auditing & Compliance
- Run-Time Protections
- Automated Threat Detection (DDoS, DNS, SQLi …)
- Network Based Application Isolation (Layer 7)
- Endpoint Process & Syscall Monitoring
- Security Response
OpenShift-Kubernetes Container Security Enhancements
- Build, Infrastructure & Deployment
- Network Security
- Endpoint Security
- Compliance
- Integration
NeuVector + OpenShift Architecture
NeuVector Demo [23:00]
Categories
- Container Security (74)
- Cloud Security (35)
- Docker Security (30)
- Kubernetes Security (26)
- Press Releases (21)
- Network Security (18)
- Container Threats (17)
- Articles (14)
- Kubernetes (13)
- Vulnerabilities (13)
- Container Networking (8)
- Container Firewall (7)
- Exploits (7)
- RedHat OpenShift (7)
- cloud-native security (7)
- AWS (6)
- Partnerships (6)
- Alerts (4)
- Ebooks + Guides (4)
- data loss prevention (4)
- security automation (4)
- service mesh (4)
- Cloud services (3)
- Compliance (3)
- Cyber Attacks (3)
- Kubernetes system (3)
- Microservices (3)
- NeuVector Product (3)
- Serverless (3)
- dlp (3)
- AWS ECS (2)
- CI/CD (2)
- CIS Benchmark (2)
- Customer Stories (2)
- Docker (2)
- Infrastructure as Code (2)
- Istio (2)
- Open Source (2)
- PCI Compliance (2)
- PCI-DSS (2)
- Slider Ebooks & Guides (2)
- Terraform (2)
- VMware (2)
- run-time (2)
- security mesh (2)
- shift left (2)
- waf (2)
- Alibaba (1)
- App Mesh (1)
- Backdoor (1)
- Banking (1)
- Black Duck Software (1)
- Docker Hub (1)
- Docker Networking (1)
- Docker container firewall (1)
- ECS (1)
- EKS (1)
- Events (1)
- Financial Services (1)
- GDPR (1)
- IBM Cloud (1)
- Internet of Things (1)
- JFrog (1)
- Jenkins (1)
- Knative (1)
- OpenShift (1)
- Secrets (1)
- VMware Photon (1)
- Virtual Patching (1)
- Webinar (1)
- admission control (1)
- application security (1)
- container risk score (1)
- cpu optimization (1)
- crypto (1)
- data breach (1)
- dpi (1)
- grafana (1)
- linkerd2 (1)
- micro-perimeter (1)
- monitoring (1)
- pci (1)
- prometheus (1)
- rancher (1)
- real-time containers (1)
- sdlc (1)
- sensitive data (1)