Useful Links
Computer Science
Cybersecurity
Microservices Security
1. Introduction to Microservices Security
2. Identity and Access Management (IAM)
3. Securing Service-to-Service Communication
4. Secrets Management
5. Container and Orchestration Security
6. Observability and Threat Detection
7. Advanced Security Concepts and Practices
Container and Orchestration Security
Securing the Container Image
Base Image Hardening
Removing Unnecessary Packages
Using Trusted Sources
Minimal Base Images
Minimizing Image Layers and Size
Reducing Attack Surface
Multi-stage Builds
Static Analysis Security Testing (SAST) for Dockerfiles
Linting and Best Practices
Dockerfile Security Rules
Vulnerability Scanning of Images
Automated Scanning Tools
Remediation of Vulnerabilities
Continuous Monitoring
Using Distroless or Minimal Base Images
Benefits and Limitations
Implementation Strategies
Image Signing and Verification
Digital Signatures
Supply Chain Security
Securing the Container Runtime
Principle of Least Privilege for Containers
User Permissions
Capability Dropping
Resource Limits
Disabling Privileged Mode
Risks of Privileged Containers
Alternative Approaches
Read-only Root Filesystems
Preventing Unauthorized Modifications
Temporary File Handling
Security Profiles
Seccomp
System Call Filtering
Profile Creation
AppArmor
Profile Enforcement
Custom Profiles
SELinux
Context-based Access Control
Policy Configuration
Runtime Security Monitoring
Behavioral Analysis
Anomaly Detection
Securing the Orchestrator (Kubernetes Focus)
Role-Based Access Control (RBAC)
User and Service Account Permissions
ClusterRoles and Roles
RoleBindings and ClusterRoleBindings
Pod Security Policies / Standards
Pod Security Admission
Restricting Privileged Operations
Security Context Configuration
Network Policies
Default Deny
Isolating Namespaces
Controlling Ingress and Egress
Policy Implementation
Securing the Control Plane
API Server Hardening
Authentication and Authorization
Audit Logging
Admission Controllers
etcd Security
Data Encryption
Access Controls
Backup Security
Securing Worker Nodes
Node Hardening
Limiting Node Access
Kubelet Security
Namespace Isolation
Resource Quotas
Network Segmentation
Multi-tenancy Considerations
Previous
4. Secrets Management
Go to top
Next
6. Observability and Threat Detection