Microservices Security

  1. Container and Orchestration Security
    1. Securing the Container Image
      1. Base Image Hardening
        1. Removing Unnecessary Packages
          1. Using Trusted Sources
            1. Minimal Base Images
            2. Minimizing Image Layers and Size
              1. Reducing Attack Surface
                1. Multi-stage Builds
                2. Static Analysis Security Testing (SAST) for Dockerfiles
                  1. Linting and Best Practices
                    1. Dockerfile Security Rules
                    2. Vulnerability Scanning of Images
                      1. Automated Scanning Tools
                        1. Remediation of Vulnerabilities
                          1. Continuous Monitoring
                          2. Using Distroless or Minimal Base Images
                            1. Benefits and Limitations
                              1. Implementation Strategies
                              2. Image Signing and Verification
                                1. Digital Signatures
                                  1. Supply Chain Security
                                2. Securing the Container Runtime
                                  1. Principle of Least Privilege for Containers
                                    1. User Permissions
                                      1. Capability Dropping
                                        1. Resource Limits
                                        2. Disabling Privileged Mode
                                          1. Risks of Privileged Containers
                                            1. Alternative Approaches
                                            2. Read-only Root Filesystems
                                              1. Preventing Unauthorized Modifications
                                                1. Temporary File Handling
                                                2. Security Profiles
                                                  1. Seccomp
                                                    1. System Call Filtering
                                                      1. Profile Creation
                                                      2. AppArmor
                                                        1. Profile Enforcement
                                                          1. Custom Profiles
                                                          2. SELinux
                                                            1. Context-based Access Control
                                                              1. Policy Configuration
                                                            2. Runtime Security Monitoring
                                                              1. Behavioral Analysis
                                                                1. Anomaly Detection
                                                              2. Securing the Orchestrator (Kubernetes Focus)
                                                                1. Role-Based Access Control (RBAC)
                                                                  1. User and Service Account Permissions
                                                                    1. ClusterRoles and Roles
                                                                      1. RoleBindings and ClusterRoleBindings
                                                                      2. Pod Security Policies / Standards
                                                                        1. Pod Security Admission
                                                                          1. Restricting Privileged Operations
                                                                            1. Security Context Configuration
                                                                            2. Network Policies
                                                                              1. Default Deny
                                                                                1. Isolating Namespaces
                                                                                  1. Controlling Ingress and Egress
                                                                                    1. Policy Implementation
                                                                                    2. Securing the Control Plane
                                                                                      1. API Server Hardening
                                                                                        1. Authentication and Authorization
                                                                                          1. Audit Logging
                                                                                            1. Admission Controllers
                                                                                            2. etcd Security
                                                                                              1. Data Encryption
                                                                                                1. Access Controls
                                                                                                  1. Backup Security
                                                                                                2. Securing Worker Nodes
                                                                                                  1. Node Hardening
                                                                                                    1. Limiting Node Access
                                                                                                      1. Kubelet Security
                                                                                                      2. Namespace Isolation
                                                                                                        1. Resource Quotas
                                                                                                          1. Network Segmentation
                                                                                                            1. Multi-tenancy Considerations