SlideShare a Scribd company logo
Knock knock: Security threats with
Kubernetes
Click to edit text
Whoami
Igor Khoroshchenko
Security Researcher/SecOps
@UnderDefense
Active contributor in OWASP
Ukraine, OWASP Lviv, DC38032,
CSA Ukraine
Find and talk with me about:
Cloud Security
Threat Intelligence
Future threats
Security automation
What You Think You Look Like
What You Actually Look Like
Agenda
Shared responsibility
Researches
Threat Intelligence
Materials
Shared responsibility
Spoilers: good vs. evil balance
False negatives
False positives
Source Confidence
Constantly changing world
Human errors
Automation
Exposed environments: out of the box
Kubernetes
Exposed environments 95% AWS hosted
Threat hunting: Kubernetes scans - THE “GOOD”
IP: 198.x.0.x.130 Domain name: censys*.shodan.io
More than 10
companies
Threat hunting: Kubernetes scans - THE “WDF”
IP: 54.x.6.x.2 Domain name:
ec2-x-x-x-2.us-west-2.
compute.amazonaws.com
More than
30 actors
Better way to monitor activities: Honeypots
30
70
Up to 80 connections
per day
Cloud compromised services
13 - BruCON 0x0A - All Your
Cloud Are Belong To Us –
Hunting Compromise in
Azure - Nate Warfield
Azure insides
● 46% of images
on Azure expose
ports by default
● 2.1 million
exposed ports
on Azure
MongoDB Ransomware case
5 days to appear at Shodan and other public search engines
17 seconds to wipe and write a message with BTC wallet
Automation shades?
How to handle: Automation is a requirement
when you promise proactive security
Latest threat bulletins: Kubernetes
Fixed in Docker - 18.09.2
It took 4 days to fix it in
AWS
Compute abuse/Nefarious use: Cryptojacking 011
“Sponsored” by:
WAVE1
WAVE3
WAVE2 Half-year
Tripwire State of
Container
Security Report
2019
Kubernetes security
1. Restrict access to kubectl
2. Use RBAC
3. Use a network policy
4. Protect dashboard
5. Disable account token
6. Use pod security policy
7. Restrict access to Cloud Metadata
8. Services mesh - Istio
9. Security audit/monitoring - K8Guard, KubeATF, KubeAudit
10. Commercial Security solutions - NeuVector/TwistLock
Kubernetes security hardening roadmap
Attack-Driven Hardening approach
Mitigate the lack of experience with money =)community
And tools in
da hause
Enterprise Kubernetes security AquaSecurity
Running aquasec/kube-hunter
Complexity of being secure with container
environments
License expiration flaws
DevOps aligned with Security
Compliance
anybody?
Thanks to
vadym@owasp.
lviv
CIS20
ISO27k
NIST CSF
github.com/
aquasecurity/
kube-bench
 Security threats with Kubernetes - Igor Khoroshchenko
Operational fails: where is the balance between
Security and common sense
Upgrading etcd
Thanks/References
Brad Geesaman, Symantec Hacking and hardening Kubernetes V2
Gunjan Patel of Palo Alto Networks - Container Security Best
Practices
Aquasecurity and Michael Cherny, Hashicorp and Cloud Native
Complete Guide to Container Security Secure by Defaults
Google Cloud Next 18’ - Kubernetes for Enterprise Security
Requirements
Stanislav Kolenkin - Kubernetes Security
Vadym Opryshko - Security assessment 101
Bug Bounties as additional maturity step
Do the numbers
look real now?
Q&A and contacts
t.me/ELV8E
i.khoroshchenko@gmail.com
Slides: https://bit.ly/2UfREW3
t.me/DC38032
t.me/owaspua
Kyiv based:
t.me/DC8044

More Related Content

What's hot (20)

PDF
What is Google Cloud Good For at DevFestInspire 2021
Robert John
 
PDF
Kubescape single pane of glass
LibbySchulze1
 
PDF
Securing Kubernetes Workloads
Jim Bugwadia
 
PDF
Cisco Cloud Networking Workshop
Cisco Canada
 
PDF
Container Security Deep Dive & Kubernetes
Aqua Security
 
PDF
DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security
DevOpsDays Riga
 
PDF
(SACON) Madhu Akula - Automated Defense Using Cloud Service Aws, Azure, Gcp
Priyanka Aash
 
PDF
Whats new in brigade 2
LibbySchulze
 
PDF
Empower Your Docker Containers with Watson - DockerCon 2017 Austin
Phil Estes
 
PDF
DCSF19 Kubernetes Security with OPA
Docker, Inc.
 
PPTX
Hug #9 who's keeping your secrets
Cameron More
 
PDF
VOID19 The Power Of Community
Vietnam Open Infrastructure User Group
 
PPTX
Introduction to k3s and k3sup
Saiyam Pathak
 
PPTX
10 tips for Cloud Native Security
Karthik Gaekwad
 
PPTX
Kube Apps in action
Karthik Gaekwad
 
PDF
Don’t have a Meltdown! Practical Steps for Defending Your Apps
Docker, Inc.
 
PDF
Containers & Security
All Things Open
 
PPTX
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
Docker, Inc.
 
PDF
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...
sangam biradar
 
PDF
Continuous Delivery With Containers
All Things Open
 
What is Google Cloud Good For at DevFestInspire 2021
Robert John
 
Kubescape single pane of glass
LibbySchulze1
 
Securing Kubernetes Workloads
Jim Bugwadia
 
Cisco Cloud Networking Workshop
Cisco Canada
 
Container Security Deep Dive & Kubernetes
Aqua Security
 
DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security
DevOpsDays Riga
 
(SACON) Madhu Akula - Automated Defense Using Cloud Service Aws, Azure, Gcp
Priyanka Aash
 
Whats new in brigade 2
LibbySchulze
 
Empower Your Docker Containers with Watson - DockerCon 2017 Austin
Phil Estes
 
DCSF19 Kubernetes Security with OPA
Docker, Inc.
 
Hug #9 who's keeping your secrets
Cameron More
 
VOID19 The Power Of Community
Vietnam Open Infrastructure User Group
 
Introduction to k3s and k3sup
Saiyam Pathak
 
10 tips for Cloud Native Security
Karthik Gaekwad
 
Kube Apps in action
Karthik Gaekwad
 
Don’t have a Meltdown! Practical Steps for Defending Your Apps
Docker, Inc.
 
Containers & Security
All Things Open
 
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
Docker, Inc.
 
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...
sangam biradar
 
Continuous Delivery With Containers
All Things Open
 

Similar to Security threats with Kubernetes - Igor Khoroshchenko (20)

PDF
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
NoNameCon
 
PPTX
KubeSecOps
Karthik Gaekwad
 
PPTX
The State of Kubernetes Security
Jimmy Mesta
 
PDF
The Hacker's Guide to Kubernetes
Patrycja Wegrzynowicz
 
PPTX
Kubernetes Security Act Now Before It’s Too Late
Michael Furman
 
PDF
Practical Guide to Securing Kubernetes
Lacework
 
PPTX
DevSecOps in a cloudnative world
Karthik Gaekwad
 
PDF
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019
Lacework
 
PPTX
12 Ways Not to get 'Hacked' your Kubernetes Cluster
Suman Chakraborty
 
PDF
GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes
James Anderson
 
PDF
Continuous Security: From tins to containers - now what!
Michael Man
 
PDF
Containers At-Risk A Review of 21,000 Cloud Environments
Lacework
 
PDF
Containers at risk a review of 21,000 cloud environments
dhubbard858
 
PPTX
Practical Approaches to Cloud Native Security
Karthik Gaekwad
 
PDF
Securing k8s With Kubernetes Goat
Muhammad Yuga Nugraha
 
PPTX
K8s security best practices
Sharon Vendrov
 
PPTX
Kubernetes and container security
Volodymyr Shynkar
 
PPTX
Kubernetes security with AWS
Kasun Madura Rathnayaka
 
PDF
Attacking and Defending Kubernetes - Nithin Jois
OWASP Hacker Thursday
 
PPTX
K8s security best practices
Sharon Vendrov
 
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
NoNameCon
 
KubeSecOps
Karthik Gaekwad
 
The State of Kubernetes Security
Jimmy Mesta
 
The Hacker's Guide to Kubernetes
Patrycja Wegrzynowicz
 
Kubernetes Security Act Now Before It’s Too Late
Michael Furman
 
Practical Guide to Securing Kubernetes
Lacework
 
DevSecOps in a cloudnative world
Karthik Gaekwad
 
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019
Lacework
 
12 Ways Not to get 'Hacked' your Kubernetes Cluster
Suman Chakraborty
 
GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes
James Anderson
 
Continuous Security: From tins to containers - now what!
Michael Man
 
Containers At-Risk A Review of 21,000 Cloud Environments
Lacework
 
Containers at risk a review of 21,000 cloud environments
dhubbard858
 
Practical Approaches to Cloud Native Security
Karthik Gaekwad
 
Securing k8s With Kubernetes Goat
Muhammad Yuga Nugraha
 
K8s security best practices
Sharon Vendrov
 
Kubernetes and container security
Volodymyr Shynkar
 
Kubernetes security with AWS
Kasun Madura Rathnayaka
 
Attacking and Defending Kubernetes - Nithin Jois
OWASP Hacker Thursday
 
K8s security best practices
Sharon Vendrov
 
Ad

More from Kuberton (6)

PDF
Using Sentry for error collection and analysis in a distributed system - Yevg...
Kuberton
 
PDF
Monitoring&Logging - Stanislav Kolenkin
Kuberton
 
PDF
How to grant permission to your Kubernetes cluster for another users. - Stan...
Kuberton
 
PDF
Chaos Testing of Microservices - Shalamov Maksym
Kuberton
 
PDF
Monolith vs Microservices with Golang at practice - Ivan Kutuzov
Kuberton
 
PDF
Kubernetes in Modern Application Architecture - Orkhan Gasimov
Kuberton
 
Using Sentry for error collection and analysis in a distributed system - Yevg...
Kuberton
 
Monitoring&Logging - Stanislav Kolenkin
Kuberton
 
How to grant permission to your Kubernetes cluster for another users. - Stan...
Kuberton
 
Chaos Testing of Microservices - Shalamov Maksym
Kuberton
 
Monolith vs Microservices with Golang at practice - Ivan Kutuzov
Kuberton
 
Kubernetes in Modern Application Architecture - Orkhan Gasimov
Kuberton
 
Ad

Recently uploaded (20)

PDF
CloudStack GPU Integration - Rohit Yadav
ShapeBlue
 
PPTX
Machine Learning Benefits Across Industries
SynapseIndia
 
PPTX
Earn Agentblazer Status with Slack Community Patna.pptx
SanjeetMishra29
 
PDF
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
PDF
UiPath vs Other Automation Tools Meeting Presentation.pdf
Tracy Dixon
 
PDF
Market Insight : ETH Dominance Returns
CIFDAQ
 
PDF
Productivity Management Software | Workstatus
Lovely Baghel
 
PDF
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
PDF
How a Code Plagiarism Checker Protects Originality in Programming
Code Quiry
 
PPTX
Building and Operating a Private Cloud with CloudStack and LINBIT CloudStack ...
ShapeBlue
 
PPTX
Top Managed Service Providers in Los Angeles
Captain IT
 
PPTX
TYPES OF COMMUNICATION Presentation of ICT
JulieBinwag
 
PDF
Bitcoin+ Escalando sin concesiones - Parte 1
Fernando Paredes García
 
PDF
GITLAB-CICD_For_Professionals_KodeKloud.pdf
deepaktyagi0048
 
PPTX
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
PPTX
UI5Con 2025 - Beyond UI5 Controls with the Rise of Web Components
Wouter Lemaire
 
PDF
Apache CloudStack 201: Let's Design & Build an IaaS Cloud
ShapeBlue
 
PPTX
The Yotta x CloudStack Advantage: Scalable, India-First Cloud
ShapeBlue
 
PDF
Arcee AI - building and working with small language models (06/25)
Julien SIMON
 
PDF
Ampere Offers Energy-Efficient Future For AI And Cloud
ShapeBlue
 
CloudStack GPU Integration - Rohit Yadav
ShapeBlue
 
Machine Learning Benefits Across Industries
SynapseIndia
 
Earn Agentblazer Status with Slack Community Patna.pptx
SanjeetMishra29
 
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
UiPath vs Other Automation Tools Meeting Presentation.pdf
Tracy Dixon
 
Market Insight : ETH Dominance Returns
CIFDAQ
 
Productivity Management Software | Workstatus
Lovely Baghel
 
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
How a Code Plagiarism Checker Protects Originality in Programming
Code Quiry
 
Building and Operating a Private Cloud with CloudStack and LINBIT CloudStack ...
ShapeBlue
 
Top Managed Service Providers in Los Angeles
Captain IT
 
TYPES OF COMMUNICATION Presentation of ICT
JulieBinwag
 
Bitcoin+ Escalando sin concesiones - Parte 1
Fernando Paredes García
 
GITLAB-CICD_For_Professionals_KodeKloud.pdf
deepaktyagi0048
 
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
UI5Con 2025 - Beyond UI5 Controls with the Rise of Web Components
Wouter Lemaire
 
Apache CloudStack 201: Let's Design & Build an IaaS Cloud
ShapeBlue
 
The Yotta x CloudStack Advantage: Scalable, India-First Cloud
ShapeBlue
 
Arcee AI - building and working with small language models (06/25)
Julien SIMON
 
Ampere Offers Energy-Efficient Future For AI And Cloud
ShapeBlue
 

Security threats with Kubernetes - Igor Khoroshchenko