Kubernetes Security

  • Kubernetes Architecture

  • Kubernetes Attack Surface

    • Control Plane

      • etcd

      • master nodes

  • Kubernetes Secure Configurations

    • Public traffic to cluster is proxied through load balancer

    • Cluster RBAC

  • Kubernetes Threat Model

  • Tools

  • Attack Paths

    • subdomain enumeration -> S3 bucket scan

    • Web application exploitation -> api call exploitation -> RCE ->SSRF -> access to pods

      • Ex: java struts running on internet facing pod (CVE-2017-5638)

    • Nuclei templates -> subdomains/api's

References:

Last updated