# Kubernetes Security Resources ## Resources from k8s, Cloud Native Foundation, and Others - [Kubernetes.io](https://kubernetes.io/) - [Kubernetes GitHub](https://github.com/kubernetes/kubernetes) - [NSA Kubernetes Hardening Guidance](https://media.defense.gov/2021/Aug/03/2002820425/-1/-1/1/CTR_KUBERNETES%20HARDENING%20GUIDANCE.PDF) - [Kubernetes Security and Disclosure Information](https://kubernetes.io/docs/reference/issues-security/security/) - [Cloud Native Security](https://kubernetes.io/docs/concepts/security/overview/) - [Pod Security Standards](https://kubernetes.io/docs/concepts/security/pod-security-standards/) - [CNCF SIG Security](https://github.com/cncf/sig-security) - [CNCF SIG Security Meeting Notes](https://docs.google.com/document/d/170y5biX9k95hYRwprITprG6Mc9xD5glVn-4mB2Jmi2g/edit) - [CNCF SIG Security Mailing List](https://lists.cncf.io/g/cncf-sig-security) - [Kubernetes SIG Security](https://github.com/kubernetes/community/tree/master/sig-security) - [Kubernetes SIG ecurity Meeting Notes](https://docs.google.com/document/d/1GgmmNYN88IZ2v2NBiO3gdU8Riomm0upge_XNVxEYXp0/edit) - [Kubernetes SIG Auth (Authorization, Authentication, and Cluster Security Policy)](https://github.com/kubernetes/community/tree/master/sig-auth) - [Kubernetes Security Audit 2019 Results](https://github.com/kubernetes/community/tree/master/sig-security/security-audit-2019) - [Kubernetes Security Audit 2021 RFP](https://github.com/kubernetes/community/blob/master/sig-security/security-audit-2021/RFP.md) ## Multiple Conference Presentations - [Compromising Kubernetes Cluster by Exploiting RBAC Permissions - Eviatar Gerzi, CyberArk (RSA 2020)](https://www.youtube.com/watch?v=1LMo0CftVC4) - [Kubernetes Deconstructed: Understanding Kubernetes by Breaking It Down - Carson Anderson, DOMO](https://www.youtube.com/watch?v=90kZRyPcRZw) - [Kubernetes Deconstructed: Understanding Kubernetes by Breaking It Down - Carson Anderson, DOMO (Extended Version)](https://vimeo.com/245778144/4d1d597c5e) - [Advanced Persistence Threats: The Future of Kubernetes Attacks (RSAC 2020)](https://www.youtube.com/watch?v=CH7S5rE3j8w) - [Kubernetes Security Best Practices - Ian Lewis, Google](https://www.youtube.com/watch?v=wqsUfvRyYpw) - [Securing Kubernetes Secrets (Cloud Next '19)](https://www.youtube.com/watch?v=DNKcRUyz4Hw) - [Jay Beale - Attacking and Defending Kubernetes - DEF CON 27 Packet Hacking Village](https://www.youtube.com/watch?v=2fmAuR3rnBo) - [The State of Kubernetes Security - Liz Rice](https://www.youtube.com/watch?v=_l56oUxHSio) - [DIY Pen-Testing for Your Kubernetes Cluster - Liz Rice, Aqua Security](https://www.youtube.com/watch?v=fVqCAUJiIn0) - [Kubernetes Security 101: Best Practices to Secure your Cluster](https://www.youtube.com/watch?v=d-pIWfDaZK8&t=3408s) ## Blogs and Articles - [Container Security: Examining Potential Threats to the Container Environment](https://www.trendmicro.com/vinfo/us/security/news/security-technology-container-security-examining-potential-threats-to-the-container-environment) - [Kubernetes securityContext: Linux capabilities in Kubernetes](https://snyk.io/blog/kubernetes-securitycontext-linux-capabilities/) - [10 Kubernetes Security Context settings you should understand](https://snyk.io/blog/10-kubernetes-security-context-settings-you-should-understand/) - [Kubesploit: A New Offensive Tool for Testing Containerized Environments](https://www.cyberark.com/resources/threat-research-blog/kubesploit-a-new-offensive-tool-for-testing-containerized-environments) - [Securing Kubernetes Clusters by Eliminating Risky Permissions](https://www.cyberark.com/resources/threat-research-blog/securing-kubernetes-clusters-by-eliminating-risky-permissions) - [Using Kubelet Client to Attack the Kubernetes Cluster](https://www.cyberark.com/resources/threat-research-blog-using-kubelet-client-to-attack-the-kubernetes-cluster) - [Eight Ways to Create a Pod](https://www.cyberark.com/resources/threat-research-blog/eight-ways-to-create-a-pod) - [Risk8s Business: Risk Analysis of Kubernetes Clusters](https://tldrsec.com/guides/kubernetes/) - [How to Set Up and Manage Logs with Kubernetes](https://iamondemand.com/blog/how-to-set-up-and-manage-logs-with-kubernetes/) - [The Current State of Kubernetes Threat Modelling](https://www.marcolancini.it/2020/blog-kubernetes-threat-modelling/) - [Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes](https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/) - [The Basics of Keeping Kubernetes Clusters Secure](https://www.trendmicro.com/vinfo/us/security/news/security-technology-the-basics-of-keeping-your-kubernetes-cluster-secure-part-1) - [The Basics of Keeping Kubernetes Cluster Secure: Worker Nodes and Related Components](https://www.trendmicro.com/vinfo/us/security/news-virtualization-and-cloud/the-basics-of-keeping-kubernetes-cluster-secure-worker-nodes-and-related-components) - [How to Secure Your Kubernetes Cluster](https://containerjournal.com/topics/container-security/how-to-secure-your-kubernetes-cluster/) - [Kubernetes Security 101: Best Practices To Secure Your Cluster](https://www.devseccon.com/kubernetes-security-101-best-practices-to-secure-your-cluster-secadvent-day-17/) - [Kubernetes Security](https://kubernetes-security.info/) - [Introducing Kubernetes Goat](https://blog.madhuakula.com/introducing-kubernetes-goat-8624f6d70e9e) - [Threat Matrix for Kubernetes](https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/) - [Open Sourcing the Kubernetes Security Audit](https://www.cncf.io/blog/2019/08/06/open-sourcing-the-kubernetes-security-audit/) - [Amazon EKS Best Practices Guide for Security](https://aws.github.io/aws-eks-best-practices/) - [Protecting Kubernetes: The Kubernetes Attack Matrix and How to Mitigate Its Threats](https://security.stackrox.com/rs/219-UEH-533/images/StackRox-Whitepaper-Kubernetes_Attack_Matrix_and_Mitigation.pdf) - [Securing the 4Cs of Cloud Native](https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud-securing-the-4-cs-of-cloud-native-systems-cloud-cluster-container-and-code) - [CVE-2018-18264 Privilege escalation through Kubernetes dashboard](https://sysdig.com/blog/privilege-escalation-kubernetes-dashboard) - [Certified Kubernetes Security Specialist (CKS) exam guide](https://medium.com/cooking-with-azure/certified-kubernetes-security-specialist-cks-exam-guide-a8fc2b4c47ea) ## Books - [Hacking Kubernetes by Andrew Martin, Michael Hausenblas](https://learning.oreilly.com/library/view/hacking-kubernetes/9781492081722/) - [Learn Kubernetes Security by Kaizhe Huang and Pranjal Jumde](https://www.amazon.com/Learn-Kubernetes-Security-orchestrate-microservices-ebook/dp/B087Q9G51R) - [Kubernetes Security by Liz Rice and Michael Hausenblas](https://info.aquasec.com/kubernetes-security) - [Container Security by Liz Rice](https://containersecurity.tech/) - [Kubernetes: Up and Running, Second Edition by Brendan Burns, Joe Beda and Kelsey Hightower](https://azure.microsoft.com/en-us/resources/kubernetes-up-and-running/) - [Kubernetes Patterns: Reusable Elements for Designing Cloud-Native Applications by Bilgin Ibryam & Roland Huß](https://www.redhat.com/cms/managed-files/cm-oreilly-kubernetes-patterns-ebook-f19824-201910-en.pdf) ## Certifications - [CKAD](https://www.cncf.io/certification/ckad/) - [CKA](https://www.cncf.io/certification/cka/) - [Certified Kubernetes Administrator (CKA) Course](https://github.com/kodekloudhub/certified-kubernetes-administrator-course) - [CKS](https://www.cncf.io/certification/cks/) - [Certified Kubernetes Security Specialist (CKS)](https://github.com/walidshaari/Certified-Kubernetes-Security-Specialist) - [CKSS-Certified-Kubernetes-Security-Specialist](https://github.com/ibrahimjelliti/CKSS-Certified-Kubernetes-Security-Specialist) - [Certified Kubernetes Security Specialist Study Guide](https://github.com/stackrox/Kubernetes_Security_Specialist_Study_Guide) - [References for CKS Exam Objectives](https://github.com/abdennour/certified-kubernetes-security-specialist) ## CVEs - [Exploring container security: Vulnerability management in open-source Kubernetes](https://cloud.google.com/blog/products/containers-kubernetes/exploring-container-security-vulnerability-management-in-open-source-kubernetes) - [CVE-2019-11247](https://nvd.nist.gov/vuln/detail/CVE-2019-11247) - [CVE-2019-11249](https://nvd.nist.gov/vuln/detail/CVE-2019-11249) - [CVE-2018-18264](https://nvd.nist.gov/vuln/detail/CVE-2018-18264) ## Slides - [Communication is Key - Understanding Kubernetes Networking (KubeCon EU 2020)](https://static.sched.com/hosted_files/kccnceu20/3d/Communication_is_Key.pdf) - [Seccomp Profiles and you: A practical guide (KubeCon EU 2020)](https://www.slideshare.net/DuffieCooley/seccomp-profiles-and-you-a-practical-guide) - [Advanced Persistence Threats: The Future of Kubernetes Attacks (KubeCon EU 2020)](https://speakerdeck.com/iancoldwater/advanced-persistence-threats-the-future-of-kubernetes-attacks) - [Help! My Cluster Is On The Internet!](https://bit.ly/SamK8sSec) ## Trainings - [Secure Kubernetes](https://securekubernetes.com/) - [Cloud Native Security Tutorial](https://tutorial.kubernetes-security.info/) - [Kubernetes Security (Advanced Concepts)](https://acloudguru.com/course/kubernetes-security-advanced-concepts) - [Kubernetes Goat Guide](https://madhuakula.com/kubernetes-goat/) - [Katacoda Kubernetes Goat Videos](https://katacoda.com/madhuakula/scenarios/kubernetes-goat) - [Attacking and Auditing Docker Containers and Kubernetes Clusters](https://github.com/Kloudle/attacking-and-auditing-docker-containers-and-kubernetes-clusters-training) - [A Cloud Guru Kubernetes Security](https://acloudguru.com/course/kubernetes-security) - [SANS Cloud-Native Security Defending Containers and Kubernetes](https://www.sans.org/event/stay-sharp-blue-team-ops-and-cloud-dec-2020/course/cloud-native-security-defending-containers-kubernetes) - [Tutorial: Getting Started With Cloud-Native Security - KubeCon EU 2020 - Liz Rice & Michael Hausenblas](https://youtu.be/MisS3wSds40) - [Control Plane Security Training](https://control-plane.io/training/) - [Kubernetes Exam Simulator](https://killer.sh/cks) - [Kubernetes Security Workshop](https://github.com/scotty-c/kubernetes-security-workshop) - [Linux Academy - Kubernetes Security](https://github.com/linuxacademy/content-kubernetes-security) ## Repositories / Tools ### Learning - [kubectl](https://kubernetes.io/docs/tasks/tools/install-kubectl/) - [krew](https://krew.sigs.k8s.io/docs/user-guide/setup/install/) - [Bust-a-Kube](https://www.bustakube.com/) - [kube-goat](https://github.com/ksoclabs/kube-goat) - [Kubernetes Goat](https://github.com/madhuakula/kubernetes-goat) - [Kubernetes Networking Labs for KubeCon EU 2020 Talk](https://github.com/korvus81/k8s-net-labs) - [CNCF Security Audits](https://github.com/magnologan/cncf-security-audits) ### Attacking - [kubesploit](https://github.com/cyberark/kubesploit) - [kubeletctl](https://github.com/cyberark/kubeletctl) - [kube-hunter](https://github.com/aquasecurity/kube-hunter) - [Peirates](https://github.com/inguardians/peirates) ### Defending - [KubiScan](https://github.com/cyberark/KubiScan) - [Kubernetes Audit by Trail of Bits](https://github.com/trailofbits/audit-kubernetes) - [kubeaudit](https://github.com/Shopify/kubeaudit) - [SecretScanner](https://github.com/deepfence/SecretScanner) - [ThreatMapper](https://github.com/deepfence/ThreatMapper) - [falco](https://github.com/falcosecurity/falco) - [kubesec](https://github.com/controlplaneio/kubesec) - [kube-bench](https://github.com/aquasecurity/kube-bench) - [trivy](https://github.com/aquasecurity/trivy) - [MKIT](https://github.com/darkbitio/mkit) - [kubetap](https://github.com/soluble-ai/kubetap) - [kube-forensics](https://github.com/keikoproj/kube-forensics) - [k8s-security-dashboard](https://github.com/k8scop/k8s-security-dashboard) - [CIS Kubernetes Benchmark - InSpec Profile](https://github.com/dev-sec/cis-kubernetes-benchmark) - [Kube PodSecurityPolicy Advisor](https://github.com/sysdiglabs/kube-psp-advisor) - [Inspektor Gadget](https://github.com/kinvolk/inspektor-gadget) - [PacketStreamer](https://github.com/deepfence/PacketStreamer) - [Starboard](https://github.com/aquasecurity/starboard) - [Advocacy Site for Kubernetes RBAC](https://github.com/mhausenblas/rbac.dev) - [Helm-Snyk](https://github.com/snyk-labs/helm-snyk) - [Krane](https://github.com/appvia/krane) - [rakkess](https://github.com/corneliusweig/rakkess) - [kubectl-who-can](https://github.com/aquasecurity/kubectl-who-can) - [Kubernetes Security - Best Practice Guide](https://github.com/freach/kubernetes-security-best-practice) - [External Secrets](https://github.com/external-secrets/external-secrets) - [KubeLinter](https://github.com/stackrox/kube-linter) - [Open Policy Agent](https://www.openpolicyagent.org) - [Gatekeeper](https://github.com/open-policy-agent/gatekeeper) - [Kyverno](https://kyverno.io) ## Papers - [Kubernetes Security Assessment - Final Report - May 2019](https://github.com/kubernetes/community/blob/master/sig-security/security-audit-2019/findings/Kubernetes%20Final%20Report.pdf) - [Kubernetes Security Whitepaper - June 2019](https://github.com/kubernetes/community/blob/master/sig-security/security-audit-2019/findings/Kubernetes%20Final%20Report.pdf) - [Kubernetes Threat Model - June 2019](https://github.com/kubernetes/community/blob/master/sig-security/security-audit-2019/findings/Kubernetes%20Threat%20Model.pdf) - [Kubernetes Attack Tree](https://github.com/cncf/financial-user-group/tree/master/projects/k8s-threat-model) - [Attacking Kubernetes - A Guide for Administrators and Penetration Testers](https://github.com/kubernetes/community/blob/master/sig-security/security-audit-2019/findings/AtredisPartners_Attacking_Kubernetes-v1.0.pdf) - [CIS Kubernetes Benchmark](https://www.cisecurity.org/benchmark/kubernetes/) - [Kubernetes é seguro por default ou à prova de má configuração?](https://p0ssuidao.medium.com/kubernetes-%C3%A9-seguro-por-default-ou-aprova-de-m%C3%A1-configura%C3%A7%C3%A3o-9d3bccc2f342) 🇧🇷 ## Podcasts - [TGI Kubernetes](https://www.youtube.com/playlist?list=PL7bmigfV0EqQzxcNpmcdTJ9eFRPBe-iZa) - [The Podlets](https://thepodlets.io) - [Kubecast](https://www.kubecast.com/) - [Kubernetes Podcast (from Google)](https://kubernetespodcast.com/) - [PodCTL - Enterprise Kubernetes](https://www.podctl.com/)