-
Notifications
You must be signed in to change notification settings - Fork 14.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerable Pods - Discussing the security monitoring and control of pods at runtime #37356
Comments
@davidhadas: This issue is currently awaiting triage. SIG Docs takes a lead on issue triage for this website, but any Kubernetes member can accept issues by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/sig security
So far, Kubernetes' documentation does not really discuss microservices. If we change this, let's do that based on a good reason or, failing that, a nice high number of 👍 issue reactions. |
Kubernetes, as a system for the management of containerized applications, need to acknowledge the 4 cyber use cases that more and more users face
This new page provides the necessary clarity about the practicalities of management of containerized applications in 2022 and beyond cyber reality.
The proposed advice is nothing to do with microservice specifics.
Yes to the best of my understanding - note that the draft sent is a draft and it is assumed that more work would be needed as part of the PR and if anything is not aligned with the content guide it will be aligned.
This is probably my bad - I need to find the right phrasing and put things in a context such that it aligns with the community concepts. We can talk about pods and replica sets (and or mentioned deployments) instead of discussing microservices. I will align the issue wording. |
Maybe the word “workload” would be more appropriate than “microservice”? Or the phrase “workload component”. |
Workload, the way I use it, is a set of microservices that work together for some purpose - for example, if you develop a mobile app with a cloud backend, this backend is probably divided into multiple microservices that work together to do what you need to do at the backend. This set of microservices is a cloud workload. You may have N other workloads that you deploy. So I would not use workload. Under Kubernetes - security behavior can be associated with a Kubernetes Service (i.e. the service abstraction and the logical set of Pods that will serve this service for as long as the service exists - pods may be added, removed, or replaced). Security behavior is expected to monitor and control all requests coming via the service (how is an implementation detail) to achieve the goal of identifying zero-day, attempts to exploit a specific known vulnerability, and attempts to use a specific exploit. It is also expected to monitor and control all the pods presently servicing requests via the service (again regardless of how) to detect which of them are being misused. |
This could work as an evergreen blog article. It'd take some effort to make the content timeless / unlikely to go stale in an unhelpful way. However, I think that effort would be worth it. /remove-priority awaiting-more-evidence |
Bear in mind that:
and that:
Outside of a blog article, we usually wouldn't do that. |
Agreed that a blog post is an important venue here and I will start preparing a draft. |
@kubernetes/sig-security-leads, would we like to staff this work? |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
See #38104 |
This is a Feature Request
What would you like to be added
Add security documentation describing the need to monitor and control deployed vulnerable pods.
Why is this needed
The entire aspect of the monitoring and control of vulnerable pods is missing from the documentation
Comments
See Monitoring and Controlling Vulnerable Microservices - in this draft we discuss microservices, but the PR will put things in the context of pods, replica sets and deployments.
The text was updated successfully, but these errors were encountered: