Best Practices for Securing Kubernetes Deployments
Although Kubernetes is a powerful container orchestration platform, its complexity and its adoption makes it a prime target for security attacks. We'll go over some of the best practices for securing the Kubernetes deployments and keeping applications and data safe in this article.
This article is only about pods or deployments; I intend to cover other security related topics in subsequent articles.
Below is a list of settings and configurations that can be implemented to accomplish the intended goal.
-
securityContext.allowPrivilegeEscalation
- The
securityContext.allowPrivilegeEscalation
setting determines whether a container's privileges can be escalated. Whentrue
, it grants a container additional privileges beyond those granted by default. - Setting
allowPrivilegeEscalation
tofalse
can help reduce the risk of privilege escalation attacks.
- The
containers:
- name: webapp
image: nginx:1.17
securityContext:
allowPrivilegeEscalation: false
# Output trimmed
-
securityContext.runAsNonRoot
- The
securityContext.runAsNonRoot
setting is used to prevent containers from being run as theroot
user, which can be dangerous. - When
runAsNonRoot
is set totrue
, the container is started with a non-root user ID (UID) instead of the default root UID of 0. - The
securityContext
section is used in the following example to setrunAsNonRoot
totrue
. This means the container will be started with a non-root UID. - It's generally recommended to run containers as non-root whenever possible to reduce the risk of privilege escalation attacks. Keep in mind, however, that some applications may require root access to function properly.
- The
containers:
- name: webapp
image: nginx:1.17
securityContext:
runAsNonRoot: true
# Output trimmed
-
securityContext.readOnlyRootFilesystem
- The
securityContext.readOnlyRootFilesystem
setting is used to prevent write access to a container's root filesystem. - When this setting is enabled and set to
true
, the container's root filesystem is mounted as read-only, resulting in a runtime error if any attempt to write to the root filesystem fails. - Enabling this will for sure reduce the attack surface, However, do keep in mind that this setting may not be appropriate for all containers/applications, particularly those that require write access to the root filesystem to function properly.
- The
containers:
- name: webapp
image: nginx:1.17
securityContext:
readOnlyRootFilesystem: true
# Output trimmed
-
securityContext.runAsUser
- The
securityContext.runAsUser
setting in Kubernetes is used to specify the user ID that should be used to run a container. - Containers are run as the
root
user by default, which can pose a security risk if an attacker gains access to the container. - To reduce the risk of privilege escalation attacks, containers should be run as non-root users whenever possible.
- This configuration can be used at the pod and/or container levels; if set at the container level, it will override the pod's configuration.
- The
securityContext:
runAsUser: 1000
containers:
- name: webapp
image: nginx:1.17
# Output trimmed
-
securityContext.runAsGroup
- The
securityContext.runAsGroup
setting specifies the group ID under which the container's main process should run. - This configuration too can be used at the pod and/or container levels; if set at the container level, it will override the pod's configuration.
- The
containers:
- name: webapp
image: nginx:1.17
securityContext:
runAsGroup: 1000
# Output trimmed
-
securityContext.capabilities
- It is recommended that containers drop all
capabilities
, and only authorized or permitted ones should be added if necessary. - This helps to mitigate the risk of potential privilege escalation attacks on the containers.
- Set the
capabilities
field to an empty object{}
to remove all Linux capabilities from the container.
- It is recommended that containers drop all
containers:
- name: webapp
image: nginx:1.17
securityContext:
capabilities: {}
# Output trimmed
-
securityContext.capabilities.add
- If required you can use
add
to specify specific capabilities.
- If required you can use
containers:
- name: webapp
image: nginx:1.17
securityContext:
capabilities:
add:
- SYS_TIME
# Output trimmed
-
securityContext.capabilities.drop
- If required you can use
drop
to remove specific capabilities.
- If required you can use
containers:
- name: webapp
image: nginx:1.17
securityContext:
capabilities:
drop:
- SYS_ADMIN
# Output trimmed
NOTE:
- For more information around capabilities, fire
man capabilities
.
- resources.limits.cpu
-
resources.limits.memory
- The settings
resources.limits.cpu
andresources.limits.memory
specifies themaximum
amount of CPU/Memory that a container can use. - It's used to restrict the amount of CPU/Memory resources that a container can use.
- The settings
containers:
- name: webapp
image: nginx:1.17
resources:
limits:
cpu: "1"
memory: "512Mi"
# Output trimmed
- resources.requests.cpu
-
resources.requests.memory
- The settings
resources.requests.cpu
andresources.requests.memory
specifies theminimum
amount of CPU/Memory that a container should use. - It's used to allocate the amount of CPU/Memory resources on the node for container.
- The settings
containers:
- name: webapp
image: nginx:1.17
resources:
requests:
cpu: "0.5"
memory: "256Mi"
-
replicas
- A replica is a duplicate of a pod that runs a single application. When you deploy an application in Kubernetes, you can use the
replicas
key to specify the number of replicas you want. - This instructs Kubernetes on how many instances of the pod should be running at any given time.
- In below example we are specifying
replicas
as3
, which mean3
identical pods will run on the cluster.
- A replica is a duplicate of a pod that runs a single application. When you deploy an application in Kubernetes, you can use the
apiVersion: apps/v1
kind: Deployment
metadata:
name: webapp
spec:
replicas: 3
# Output trimmed
-
image
- When deploying applications in production, the deployment or the pods should specify an
image
tag. It is best to avoid using the:latest
image tag or no tag. - By doing this, it becomes difficult to determine which version of the image is in use and to roll back the version.
- In below example we are specifying the tag as
1.17
fornginx
image.
- When deploying applications in production, the deployment or the pods should specify an
containers:
- name: webapp
image: nginx:1.17
# Output trimmed
-
namespace
- Deployments should not be configured with the 'default' namespace; ensure that the
default
namespace is not used. - In below example we are specifying namespace as
frontend
, where the applicationwebapp
will be deployed.
- Deployments should not be configured with the 'default' namespace; ensure that the
apiVersion: apps/v1
kind: Deployment
metadata:
name: webapp
namespace: frontend
spec:
# Output trimmed
NOTE:
- There are many other securityContext options available, but these are the ones that are most commonly used.
Just for reference here is the list of options which are accepted on pod layer (to know more about it fire kubectl explain pod.spec.securityContext
):
- fsGroup
- fsGroupChangePolicy
- runAsGroup
- runAsNonRoot
- runAsUser
- seLinuxOptions
- seccompProfile
- supplementalGroups
- sysctls
- windowsOptions
And below are the ones which are accepted on container layer (to know more about it fire kubectl explain pod.spec.containers.securityContext
):
- allowPrivilegeEscalation
- capabilities
- privileged
- procMount
- readOnlyRootFilesystem
- runAsGroup
- runAsNonRoot
- runAsUser
- seLinuxOptions
- seccompProfile
- windowsOptions
If there are any important configurations or use cases that I may have missed from deployments perspective, please feel free to add them.
References:
- https://kubernetes.io/docs/home/
- Linux man pages.
- Documentation from
kubectl explain
command.
Top comments (3)
Really helpful article! Thanks very much.
_Deployments should not be configured with the 'default' namespace; ensure that the default namespace is not used._why ??
It is not impossible and is perfectly doable, but we should use it to ensure that our applications are isolated. For instance:
Let's say if you have a shared cluster which shares the resources among multiple environments (for instance dev and staging) in that case you should not deploy all the applications in default namespace and if you are planning to do so, you need to maintain their naming convention plus their labels as well. Therefore to reduce the complexity namespace is your friend.
Another instance could be let's say you have a 3 tier application consisting of a frontend, backend and a database. You should not deploy all in the default namespace because this might pose security risks as well that's because only backend should communicate with database pods.
Another instance could be let's say many people are using the cluster for learning and testing purposes and all are deploying in default namespace, in that case your work might be lost if someone accidentally updates the resources which you have created also your default namespace might become too crowded if multiple people are using it.
There can be another situations as well where we should avoid using default namespace :)