generated from kubernetes/kubernetes-template-project
-
Notifications
You must be signed in to change notification settings - Fork 73
Closed
Labels
sig/docsCategorizes an issue or PR as relevant to SIG Docs.Categorizes an issue or PR as relevant to SIG Docs.sig/securityCategorizes an issue or PR as relevant to SIG Security.Categorizes an issue or PR as relevant to SIG Security.
Description
Based on a suggestion from @JimBugwadia on slack an idea for a good page on the Kubernetes website would be to collate configurations or privileges which could allow a malicious user or attacker to bypass the API server. As many key security controls (e.g. Auditing and admission control) are handled at the API server layer, attacks which bypass it can present a serious risk to cluster security.
Some examples :-
- node/proxy rights at the cluster level can allow users to directly communicate with the kubelet API, bypassing the API server.
- To an extent users being able to create static pods bypasses some API server controls
- Direct access to the etcd database will effectively allow attackers to retrieve things like secrets without that access being visible in API server audit logs.
/sig security docs
JimBugwadia
Metadata
Metadata
Assignees
Labels
sig/docsCategorizes an issue or PR as relevant to SIG Docs.Categorizes an issue or PR as relevant to SIG Docs.sig/securityCategorizes an issue or PR as relevant to SIG Security.Categorizes an issue or PR as relevant to SIG Security.