ITNEXT

ITNEXT is a platform for IT developers & software engineers to share knowledge, connect, collaborate, learn and experience next-gen technologies.

Follow publication

Journey Of A Microservice Application In The Kubernetes World

Security considerations : policies enforcement

Luc Juggery
ITNEXT
Published in
10 min readOct 19, 2022

--

Photo by Denny Müller on Unsplash

TL;DR

In the previous article we enhanced the Deployment specifications of the webhooks app from the audit results we got from a couple of security tools. In this article we will discuss about policy enforcement tools whose purpose is to ensure misconfigured specifications cannot be created in the cluster.

Articles in this series

Policy enforcement tools

In the previous article we enhanced the Deployment specifications of the webhooks app’s microservices in order to make the whole app more secure (we will keep on enhancing those specifications in future posts). Below is the original Deployment of the api and the same Deployment with additional security related properties.

Specifications of the api microservice: original one on the left, more secure one on the right

Even if we know how we must specify a Deployment so it is more secure, nothing prevents us from sending the original version (the one on the left above) and have it created in the cluster. This can be harmful for different reasons, for example:

  • there is no resources.requests nor resources.limits thus making it possible for the api Pod to exhaust the resources need by other Pods (noisy neighbors)
  • there is no securityContext preventing a corrupted image from…

--

--

Published in ITNEXT

ITNEXT is a platform for IT developers & software engineers to share knowledge, connect, collaborate, learn and experience next-gen technologies.

Written by Luc Juggery

Docker & Kubernetes trainer (CKA / CKAD), 中文学生, Learning&Sharing

No responses yet

Write a response