Skip to content

Brief list of misconfigurations that cause a K8s to be vulnerable.

Notifications You must be signed in to change notification settings

libby/k8s-list-check-it-twice

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

1 Commit
Β 
Β 

Repository files navigation

πŸŽ… K8s Checking It Twice πŸŽ…

Top X lists of misconfigurations and vulnerablities relating to Kubernetes, as well as aggregating more in depth resources, blogs, etc. from around The Internet. warning - πŸ‘½ this documentent is alive and is subject to change.

  • @jpetazzo, @jessfraz, @raesene, @jbeda, @tallclair, @anapsix, @bradgeesaman

Helpful Resources

K8s Native List

  1. Stay up to date with upstream Kubernetes, try not to fall more than 3 months behind.
  2. Exposed Dashboard 😨
  3. CAdvisor: insecure port
  4. Misconfigured RBAC (vague, build out examples and links)
  5. Allowing anon access --anonymous-auth allows for compromising cluster with the service token access
  6. Unauthenticated kubelet
  7. Unauthenticate etcd
  8. Mounts the docker socket, e.g. docker in docker
  9. Your Pod is too strong 😨
  10. Pods with containers running applications as "root"
  11. Unencrypted etcd at rest
  12. Not Protecting The Instance metadata in cloud providers like AWS and GCP

K8's Friends Issues List

Attacks Against K8

About

Brief list of misconfigurations that cause a K8s to be vulnerable.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published