Kubernetes Security: Runtime Phase

The runtime phase exposes containerised applications to a slew of recent security challenges. The aim is to gain visibility into your running environment and discover and reply to threats as they arise. Proactively securing your containers and Kubernetes deployments at the build and deploy phases will greatly scale back the chance of security incidents at runtime and also the resultant effort required later to them.

Initially it is needed to monitor the foremost security-relevant container activities and it includes:

  • Process activity
  • Network communications among containerised services
  • Network communications between containerised services and external clients and servers

Observing container behavior to discover anomalies is usually easier in containers than in virtual machines as a result of the declarative nature of containers and Kubernetes. These attributes permit easier introspection into the deployed one and its expected activity.

Some Security Practices in Runtime Phase

  • Use the build and deploy time data in Kubernetes to judge discovered versus expected activity throughout runtime so as to observe suspicious activity.

  • Monitor running deployments for recently discovered vulnerabilities additionally to scanning for vulnerabilities that exist in container images.

  • Configure the protection context for pods to limit their capabilities. These controls will eliminate entire categories of attacks that rely on privileged access. Read-only root file systems, for instance, will stop any attack that depends on putting in software package or writing to the file system.

  • Use Kubernetes native controls that contains booming breach by automatically instructing Kubernetes to scale doubtful pods to zero or kill then restart instances of compromised applications.

  • Monitor network traffic to limit unnecessary or insecure communication. Observing active networking traffic could be a great way to know how applications act with one another and determine sudden communication. Scrutiny of the active traffic with what’s allowed provides you valuable data regarding what isn’t happening however is allowed. therewith data, you’ll be able to more tighten your allowed network policies in order that it removes superfluous connections and reduces your attack surface.

  • The method of using allow lists could be a tried and true observe for distinguishing sudden running processes.

  • Containerized applications are replicated for top accessibility, fault tolerance, or scale reasons. Replicas ought to behave nearly identically; replicas with important deviations from the others warrant any investigation. Integrate your Kubernetes security tool with alternative external systems and leverage deployment labels or annotations to alert the team accountable for a given application once a possible threat is detected. commercial Kubernetes security vendors ought to support a good array of integrations with external tools.