Kubernetes security best practices in short -

A Thread πŸ‘‡ PC: Threat Stack
1. Keep the Kubernetes cluster up to date.
2. Ensure That Only Authorized Images are Used in Your Environment
3. Limit Direct Access to Kubernetes Nodes
4. Create Administrative Boundaries between Resources
5. Keep Secrets Secret!
6. Define Resource Quota
7. Implement Network Segmentation
8. Apply Security Context to Your Pods and Containers
9. Restrict API access.
10. Restrict SSH access.
11. Use Namespaces smartly
12. Enable Role-Based Access Control (RBAC)
13. Separate sensitive workloads
14. Harden node security
15. Run a cluster-wide Pod Security Policy
16. Use network policies to restrict access
17. Never be a root
18. Have regular security audits
19. Log Everything
20. Tighten IAM policies (when running over cloud)
21. Ensure That Only Authorized Images are Used in Your Environment
22. Control network access to sensitive ports
Please add more to the list.

β€’ β€’ β€’

Missing some Tweet in this thread? You can try to force a refresh
γ€€

Keep Current with Rakesh Jain

Rakesh Jain Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @devops_tech

9 Oct
These days we are hearing a lot about #web3.

What's that?

A short thread πŸ‘‡
What was web1 or web?
The very first stage of development on the World Wide Web where only simple static websites used to exist.

Those were the times when Personal web pages (mostly static pages) used to be hosted on ISP-run web servers, or on free web hosting services.
What is web2?

Today's internet is all about web2. As per @Wikipedia Web 2.0 refers to websites that emphasize user-generated content, ease of use, participatory culture and interoperability for end users where websites and apps allow anyone to create content and share.
Read 5 tweets
9 Oct
Linux Networking Tools -

ss, nmap, dig, netcat, ping, tcpdump, socat, top, ethtool

A Thread πŸ‘‡
SS -

ss command is a tool that is used for displaying network socket related information on a Linux system.
nmap -

Nmap is short for Network Mapper. It is an open-source Linux cmd-line tool that is used to scan IPs & ports in a nw & to detect installed apps. Nmap allows nw admins to find which devices r running on their nw, discover open ports & services, and detect vulnerabilities.
Read 12 tweets
7 Oct
SSL Decoded!

Everything you need to know about Secure Socket Layer.

A Thread πŸ‘‡
What is SSL ?

It’s a protocol for encrypting and securing communications that take place on the Internet. It's now replaced by an updated protocol called TLS (Transport Layer Security) some time ago.
The main use case for SSL/TLS is securing communications between a client and a server, but it can also secure email, VoIP, and other communications over unsecured networks.
Read 23 tweets
7 Oct
I rarely use password login. And many folks out there even today aren't sure about ssh keys and their usage.

Everything about SSH Keys.

A Thread πŸ‘‡
What is SSH?

SSH is a secure protocol used as the primary means of connecting to Linux servers remotely. It provides a text-based interface by spawning a remote shell. After connecting, all commands you type in your local terminal are sent to d remote server and executed there.
Today, the SSH protocol is widely used to login remotely from one system into another, and its strong encryption makes it ideal to carry out tasks such as issuing remote commands and remotely managing network infrastructure and other vital system components.
Read 27 tweets
5 Oct
Python Cheat Sheet πŸ‘‡
Part - 1 Image
Part -2 Image
Read 4 tweets
5 Oct
BGP - A possible reason behind the recent disappearance of #facebook #instagram & #whatsapp from the internet.

What is BGP ?

#facebookoutage #networking

A Thread πŸ‘‡
BGP (Border Gateway Protocol) is the routing method that enables the Internet to function. Without it, we wouldn’t be able to do a Google search or send an email. Image
What is network routing?

β€œThe name of a resource indicates what we seek, an address indicates where it is, and a route tells us how to get there”.

- John F. Shoch
Read 14 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(