Skip to content

Kubernetes API Server Bypass Risks #42

@raesene

Description

@raesene

Based on a suggestion from @JimBugwadia on slack an idea for a good page on the Kubernetes website would be to collate configurations or privileges which could allow a malicious user or attacker to bypass the API server. As many key security controls (e.g. Auditing and admission control) are handled at the API server layer, attacks which bypass it can present a serious risk to cluster security.

Some examples :-

  • node/proxy rights at the cluster level can allow users to directly communicate with the kubelet API, bypassing the API server.
  • To an extent users being able to create static pods bypasses some API server controls
  • Direct access to the etcd database will effectively allow attackers to retrieve things like secrets without that access being visible in API server audit logs.

/sig security docs

Metadata

Metadata

Assignees

Labels

sig/docsCategorizes an issue or PR as relevant to SIG Docs.sig/securityCategorizes an issue or PR as relevant to SIG Security.

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions