Kubernetes Orchestration

  1. Security in Kubernetes
    1. Security Architecture
      1. Defense in Depth
        1. Security Boundaries
          1. Threat Model
            1. Security Domains
              1. Cloud Infrastructure
                1. Cluster
                  1. Container
                    1. Application Code
                  2. Authentication
                    1. User Authentication
                      1. X.509 Client Certificates
                        1. Static Token Files
                          1. Bootstrap Tokens
                            1. Service Account Tokens
                            2. Service Account Management
                              1. Service Account Creation
                                1. Token Management
                                  1. Pod Service Account Assignment
                                  2. External Authentication
                                    1. OpenID Connect (OIDC)
                                      1. Webhook Token Authentication
                                        1. Authentication Proxy
                                      2. Authorization
                                        1. Role-Based Access Control (RBAC)
                                          1. Roles and ClusterRoles
                                            1. Resource Permissions
                                              1. Verb Specifications
                                                1. API Group Access
                                                2. RoleBindings and ClusterRoleBindings
                                                  1. Subject Binding
                                                    1. Namespace Scope
                                                      1. Cluster Scope
                                                    2. Attribute-Based Access Control (ABAC)
                                                      1. Node Authorization
                                                        1. Webhook Authorization
                                                        2. Admission Control
                                                          1. Admission Controllers
                                                            1. Validating Admission Controllers
                                                              1. Mutating Admission Controllers
                                                                1. Built-in Controllers
                                                                2. Admission Webhooks
                                                                  1. Dynamic Admission Control
                                                                    1. Webhook Configuration
                                                                      1. Failure Policies
                                                                      2. Pod Security Standards
                                                                        1. Privileged Profile
                                                                          1. Baseline Profile
                                                                            1. Restricted Profile
                                                                            2. Open Policy Agent (OPA)
                                                                              1. Policy as Code
                                                                                1. Gatekeeper Integration
                                                                              2. Pod Security
                                                                                1. Security Contexts
                                                                                  1. User and Group IDs
                                                                                    1. Capabilities Management
                                                                                      1. Privilege Escalation
                                                                                        1. Read-Only Root Filesystem
                                                                                          1. SELinux Options
                                                                                          2. Pod Security Policies (Deprecated)
                                                                                            1. Pod Security Standards
                                                                                              1. Runtime Security
                                                                                                1. Container Image Security
                                                                                                  1. Runtime Protection
                                                                                                    1. Behavioral Analysis
                                                                                                  2. Network Security
                                                                                                    1. Network Policies
                                                                                                      1. Traffic Segmentation
                                                                                                        1. Ingress Rules
                                                                                                          1. Egress Rules
                                                                                                            1. Policy Enforcement
                                                                                                            2. Service Mesh Security
                                                                                                              1. Mutual TLS
                                                                                                                1. Identity and Access Management
                                                                                                                  1. Policy Enforcement
                                                                                                                  2. Encryption
                                                                                                                    1. Data in Transit
                                                                                                                      1. Data at Rest
                                                                                                                        1. Secret Management