Kubernetes Security
Last updated
Was this helpful?
Last updated
Was this helpful?
Kubernetes Architecture
Kubernetes Attack Surface
Control Plane
etcd
master nodes
Kubernetes Secure Configurations
Public traffic to cluster is proxied through load balancer
Cluster RBAC
Kubernetes Threat Model
Tools
Penetration Testing tool :
Trivy Vulnerability scanner :
Deepce : Docker Enumeration
Attack Paths
subdomain enumeration -> S3 bucket scan
Web application exploitation -> api call exploitation -> RCE ->SSRF -> access to pods
Ex: java struts running on internet facing pod (CVE-2017-5638)
Nuclei templates -> subdomains/api's
References: