☁︎MUIGAI, MOSES☁︎’s Post

View profile for ☁︎MUIGAI, MOSES☁︎, graphic

Cloud, Infrastructure & Automation Engineer

I recently conducted a workshop on the OpenShift Container Platform, focusing on the platform's key security features. As a container orchestration and management platform, OpenShift provides a robust set of security capabilities. Of the roughly 12 key security features in OpenShift, the 𝐭𝐨𝐩 𝟏 that piqued my interest was: ➊ 𝐏𝐨𝐝 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐏𝐨𝐥𝐢𝐜𝐢𝐞𝐬 They are essentially control mechanism capabilities that enforce security best practices and policies on pods in Kubernetes/OpenShift. ⓐ 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐨𝐧𝐭𝐞𝐱𝐭 𝐂𝐨𝐧𝐬𝐭𝐫𝐚𝐢𝐧𝐭𝐬(𝐒𝐂𝐂) ➼ Its an OpenShift-specific feature. It is a control mechanism capability to manage access for pods in the OpenShift cluster. SCC controls the actions that a pod can perform and what it has the ability to access. They define a set of conditions that a pod must run with in order to be accepted into the system. ⓑ 𝐏𝐨𝐝𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐝𝐦𝐢𝐬𝐬𝐢𝐨𝐧 𝐂𝐨𝐧𝐭𝐫𝐨𝐥𝐥𝐞𝐫𝐬 ➼ Native to Kubernetes. Similar to SCC in OpenShift, PSPs (Admission Controllers) is a control mechanism used to enforce security controls on pods. Once defined and applied in the cluster, they're evaluated during the pod creation process and can prevent the creation of pods that don't adhere to the defined security policies. ➡ 𝐔𝐬𝐞 𝐂𝐚𝐬𝐞𝐬 As an administrator, consider the following scenarios: ⚫ 𝐑𝐞𝐬𝐭𝐫𝐢𝐜𝐭 𝐏𝐨𝐝(𝐂𝐨𝐧𝐭𝐚𝐢𝐧𝐞𝐫𝐬) 𝐩𝐫𝐢𝐯𝐢𝐥𝐞𝐠𝐞𝐬. For instance:    ➼ Prevent containers from running as root users to mitigate the impact of security vulnerabilities.    ➼ Limiting access to host resources, networking, or host ports with the aim to reduce the risk of network-based attacks.     ➼ Preventing containers from mounting specific types of filesystems. ⚫Enable 𝐇𝐨𝐬𝐭 𝐌𝐨𝐮𝐧𝐭 𝐑𝐞𝐬𝐭𝐫𝐢𝐜𝐭𝐢𝐨𝐧𝐬 to prevent containers from accessing sensitive files or directories on the host system.

To view or add a comment, sign in

Explore topics