<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Fairwinds</title>
    <description>The latest articles on DEV Community by Fairwinds (@fairwindsteam).</description>
    <link>https://dev.to/fairwindsteam</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F296872%2F0193f36b-b59d-40c2-ad2a-61ce5e5fbee9.png</url>
      <title>DEV Community: Fairwinds</title>
      <link>https://dev.to/fairwindsteam</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/fairwindsteam"/>
    <language>en</language>
    <item>
      <title>Discover the Top 5 Kubernetes Security Mistakes You’re (Probably) Making</title>
      <dc:creator>Fairwinds</dc:creator>
      <pubDate>Mon, 29 Nov 2021 22:29:00 +0000</pubDate>
      <link>https://dev.to/fairwindsops/discover-the-top-5-kubernetes-security-mistakes-youre-probably-making-378f</link>
      <guid>https://dev.to/fairwindsops/discover-the-top-5-kubernetes-security-mistakes-youre-probably-making-378f</guid>
      <description>&lt;h3&gt;
  
  
  Written By: &lt;a href="https://www.fairwinds.com/blog/author/robert-brennan"&gt;Robert Brennan&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;It’s not an exaggeration to state that cloud native technology is revolutionizing how organizations are developing and delivering applications. As organizations increasingly adopt microservices and containers, many are turning to Kubernetes for container orchestration. Kubernetes controls both resource allocation and traffic management for cloud applications and microservices, providing critical capabilities for running applications in a 24x7 world. K8s enables auto-scaling, auto-recovery, and more. While the benefits of Kubernetes are impressive, many organizations struggle with five common Kubernetes security mistakes. Does your organization?&lt;/p&gt;

&lt;h2&gt;
  
  
  Kubernetes Challenges for Organizations
&lt;/h2&gt;

&lt;p&gt;Kubernetes is complex, and requires considerable learning and practice before teams &lt;a href="https://www.fairwinds.com/kubernetes-maturity-model/phase-4-build-confidence"&gt;gain confidence&lt;/a&gt; in their Kubernetes environment. If you’re just starting out, you may lack the tools, processes, and experience necessary to successfully launch Kubernetes environments. Not only that, there’s a considerable culture change that must occur in development, operations, and security teams, because Kubernetes and containers present a new approach for deploying applications. These changes mean that operations and security teams question whether the applications and data will be secure when the organization adopts microservices, containers, and Kubernetes to develop and deploy applications.&lt;/p&gt;

&lt;h2&gt;
  
  
  Security in a Cloud Native World
&lt;/h2&gt;

&lt;p&gt;In the cloud native model, many of the traditional security tools and processes are no longer the right choice, while at the same time, containers create new blind spots and attack surfaces. Getting the visibility you need across containers and clusters poses an additional challenge. In the new paradigm, developers may find that it’s now necessary to take responsibility for some of the new security challenges, which is a role most devs are unaccustomed to and may be reluctant to embrace.&lt;/p&gt;

&lt;p&gt;So what are the most common Kubernetes security mistakes that most organizations make?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Granting access to the host node&lt;/strong&gt; — it’s easy to give admin level access to applications, but it can increase your risk of attack.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Assuming the operations team is aligned with security&lt;/strong&gt; — Kubernetes offers many configuration options, which offer a lot of flexibility — and complexity — that security teams need to understand.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Running containers with known vulnerabilities&lt;/strong&gt; — Kubernetes uses containers to deliver applications, but many teams aren’t aware of the known vulnerabilities that might be exposed in those containers.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Expecting security by default using native controls&lt;/strong&gt; — while Kubernetes does offer native security features, many are not enabled by default.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Moving to production before you are ready&lt;/strong&gt; — many teams, in their understandable excitement to get applications up and running in Kubernetes, rush to push apps live, leading to security gaps.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These five mistakes can be avoided by continuously scanning your clusters in dev and production environments. Identifying them is half the battle. Learn how you can identify mistakes and remediate them. To get started on improving your Kubernetes security, learn more about the top five mistakes you’re probably making — and get the information you need to fix them. &lt;a href="https://www.fairwinds.com/top-five-kubernetes-security-mistakes-0-0"&gt;Read the white paper&lt;/a&gt;.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Written By: &lt;a href="https://www.fairwinds.com/blog/author/robert-brennan"&gt;Robert Brennan&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>kubernetes</category>
    </item>
    <item>
      <title>Kubernetes Best Practices for Security</title>
      <dc:creator>Fairwinds</dc:creator>
      <pubDate>Wed, 22 Apr 2020 16:24:06 +0000</pubDate>
      <link>https://dev.to/fairwindsops/kubernetes-best-practices-for-security-39i7</link>
      <guid>https://dev.to/fairwindsops/kubernetes-best-practices-for-security-39i7</guid>
      <description>&lt;p&gt;Kubernetes is the dominant container orchestration solution — adoption now stands at &lt;a href="https://www.stackrox.com/kubernetes-adoption-and-security-trends-and-market-share-for-containers/"&gt;86% of the market&lt;/a&gt;. The genius of Kubernetes is its ability to provide you with a framework to run distributed systems resiliently. However, it introduces a level of complexity that can be overwhelming. By following Kubernetes best practices around security, reliability, efficiency and monitoring, teams can set themselves up for a successful transition. In a series of blog posts, we’ll cover each of these topics, starting with security.&lt;/p&gt;

&lt;h2&gt;
  
  
  Kubernetes Best Practices: Security
&lt;/h2&gt;

&lt;p&gt;Kubernetes abstracts away just enough of the infrastructure layer so that developers can freely deploy, while ops teams retain access to important governance and risk controls. The challenge is that development teams new to Kubernetes may neglect some critical security features. Often the easiest way to get something working is to soften its security.&lt;/p&gt;

&lt;p&gt;Let’s look at three common security challenges, and how to overcome them.&lt;/p&gt;

&lt;h2&gt;
  
  
  A Good Burst vs. a Bad Burst
&lt;/h2&gt;

&lt;p&gt;Kubernetes responds well to bursts in traffic — whether good or bad. In the event you see a legitimate burst of traffic, Kubernetes will scale up to meet the increase in demand. Your application will consume more resources in your cluster without any degradation of performance. That’s a major benefit. However, in the event of a denial-of-service (DoS) attack, Kubernetes will do exactly the same thing, and you’ll pay for that traffic overload.&lt;/p&gt;

&lt;h2&gt;
  
  
  K8S Best Practice #1 — Set limits against:
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;the number of concurrent connections per IP address&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;the number of requests each user can make per second, minute, or hour&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;the size of request bodies&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;and tune these limits for individual hostnames and paths&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Granting Safe Levels of Access
&lt;/h2&gt;

&lt;p&gt;The easiest way to deploy a new application or provision a new user is to give away admin permissions. But it’s also the most dangerous way — if an attacker gains access to that account, they’ll have access to everything.&lt;/p&gt;

&lt;h2&gt;
  
  
  K8S Best Practice #2- Employ role based access controls (RBAC) to adhere to the principle of least privilege.
&lt;/h2&gt;

&lt;p&gt;RBAC allows you to grant users granular access to Kubernetes API resources. You should define access profiles using &lt;code&gt;Roles&lt;/code&gt; or &lt;code&gt;ClusterRoles&lt;/code&gt;. Using &lt;code&gt;Roles&lt;/code&gt;, you'll grant access to a single namespace. With &lt;code&gt;ClusterRoles&lt;/code&gt;, you can grant access to resources without namespaces, like &lt;code&gt;Nodes&lt;/code&gt; and &lt;code&gt;PersistentVolumes&lt;/code&gt;, as well as all namespaced resources.&lt;/p&gt;

&lt;p&gt;While RBAC configuration can be confusing and verbose, tools like &lt;a href="https://github.com/FairwindsOps/rbac-manager"&gt;rbac-manager&lt;/a&gt; can help simplify the syntax. This helps prevent mistakes and provides a clearer sense for who has access to what.&lt;/p&gt;

&lt;p&gt;The end result? By only granting workloads the permissions they need to do their job, you’ll limit the amount of damage an attacker can do to your Kubernetes environment.&lt;/p&gt;

&lt;h2&gt;
  
  
  Keep Kubernetes Secrets, Secret
&lt;/h2&gt;

&lt;p&gt;If you are using Kubernetes infrastructure-as-code (IaC) patterns, you benefit from having a completely reproducible environment. But there’s a catch — part of your infrastructure likely includes Kubernetes &lt;code&gt;Secrets&lt;/code&gt;, which store and manage sensitive information, such as passwords, OAuth tokens, and ssh keys. And you shouldn't be adding &lt;code&gt;Secrets&lt;/code&gt; to your IaC repository.&lt;/p&gt;

&lt;h2&gt;
  
  
  K8S Best Practice #3 — It’s tempting to check your Kubernetes secrets into your infrastructure-as-code repository so that your builds are 100% reproducible.
&lt;/h2&gt;

&lt;p&gt;But if you care about security, don’t. Once checked in, your secrets are permanently exposed to anyone with access to your Git repository.&lt;/p&gt;

&lt;p&gt;The solution is to split the difference: encrypt all your secrets so you can safely check them into your repository without fear of exposing them. Then you’ll then only need access to a single encryption key to “unlock” your IaC repository, and have perfectly reproducible infrastructure. Open source tools like&lt;a href="https://github.com/mozilla/sops"&gt; Mozilla’s SOPS&lt;/a&gt; can help with this.&lt;/p&gt;

&lt;p&gt;You can read more best practices for k8s security by checking out how we implement security for our customer’s managed Kubernetes deployments.&lt;/p&gt;

&lt;p&gt;Dig deeper into Kubernetes Best Practices for Security: &lt;a href="https://www.fairwinds.com/kubernetes-best-practices-comprehensive-white-paper"&gt;Ensure cluster security with k8s secrets, network policies, and workload identity&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Written By:&lt;/em&gt; &lt;a href="https://github.com/rbren"&gt;&lt;strong&gt;Robert Brennan&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>kubernetes</category>
    </item>
    <item>
      <title>Practical Tips from Engineering Leaders for Working From Home During Uncertain Times</title>
      <dc:creator>Fairwinds</dc:creator>
      <pubDate>Mon, 20 Apr 2020 18:54:11 +0000</pubDate>
      <link>https://dev.to/fairwindsops/practical-tips-from-engineering-leaders-for-working-from-home-during-uncertain-times-ef4</link>
      <guid>https://dev.to/fairwindsops/practical-tips-from-engineering-leaders-for-working-from-home-during-uncertain-times-ef4</guid>
      <description>&lt;p&gt;As COVID-19 spreads across the globe and many organizations have asked non-essential employees to work from home, many of us are adjusting to the new norm of conducting business where we also live our lives. As a remote-first workplace, &lt;a href="https://www.fairwinds.com/"&gt;Fairwinds&lt;/a&gt; has considerable experience in helping employees be successful working from home. We recently hosted a panel discussion, “&lt;a href="https://www.fairwinds.com/blog/remote-work-tips-and-tricks-for-your-engineering-team-panel-discussion"&gt;Remote Tips &amp;amp; Trips for Your Engineering Team&lt;/a&gt;” that had great insight for any person working from home.&lt;/p&gt;

&lt;h2&gt;
  
  
  Transitioning to Home-Based Work
&lt;/h2&gt;

&lt;p&gt;These are uncertain times. We all have a lot of unanswered questions, which, when coupled that with setting up a new work environment, can overwhelm even the most unflappable teammates.&lt;/p&gt;

&lt;p&gt;“Recognizing that there is an emotional toll where it’s affecting people who might already have the systems in place to work from home, is important,” said panel moderator, &lt;a href="https://twitter.com/blatanterror"&gt;Kendall Miller&lt;/a&gt;, president at &lt;a href="https://www.fairwinds.com/"&gt;Fairwinds&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Now, because many schools are closed, a good number of us are juggling child care responsibilities within our work days. Also, for those of us with an at-home partner, we are figuring out who works when, trying to schedule calls around each other and working to be patient with seeing each other 24/7.&lt;/p&gt;

&lt;p&gt;Employers and employees alike need to consider comfort. Sitting — or standing — at a new workstation (kitchen tables included) could take a toll. Pay attention to what your body is telling you and talk to your manager if you need ergonomic support. And, as simple as it sounds, setting routines and patterns for your day of at-home work is important. &lt;a href="https://www.linkedin.com/in/kkemmer/"&gt;Kristina Kemmer&lt;/a&gt;, Director of Engineering at &lt;a href="https://zapier.com/"&gt;Zapier&lt;/a&gt; noted, “I make sure to shower every day and actually get dressed to go to work because I need to feel a separation of home life and work life. I try not to look at Slack after hours and I think it’s really good to have cut off times.”&lt;/p&gt;

&lt;h2&gt;
  
  
  Create — or Fold Into — a Remote Culture
&lt;/h2&gt;

&lt;p&gt;You may not be able to extend free lunches or massages to remote workers, but you can help them focus on creating a culture that works for teams outside of the office. “People who have been working remotely for a while have built up communications patterns — phrases they use to say what they are working on, emojis that mean certain things, etc. If you haven’t had a remote team/workforce, sit down and figure out what exists and how to get new members into those patterns,” said &lt;a href="https://twitter.com/szelechoski"&gt;Sarah Zelechoski&lt;/a&gt;, VP of engineering at &lt;a href="https://www.fairwinds.com"&gt;Fairwinds&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Whether those patterns are standing Zoom rooms where people can join in at any time or ‘water cooler’ video chats to help people feel connected, don’t forget to focus on culture.&lt;/p&gt;

&lt;h2&gt;
  
  
  Overcommunicate
&lt;/h2&gt;

&lt;p&gt;It’s easy to overlook how much we communicate — even unknowingly — when we are together in an office setting. When we are dispersed, we have to make sure to remember to share slight details that might be important.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.linkedin.com/in/brandonjung/"&gt;Brandon Jung&lt;/a&gt;, vice president of alliances at &lt;a href="https://www.gitlab.com"&gt;GitLab&lt;/a&gt; said, “If you lead people, the biggest thing to remember is to overcommunicate. Don’t forget how important it is and that things are written down. Reach out to touch base with people, particularly with these changes.”&lt;/p&gt;

&lt;p&gt;Zelchoski echoed this sentiment noting that for all employees, “Communication, openness and status have to be completely different. You have to be more transparent. Otherwise, you will be off in your own corner doing things; you will feel isolated and people will not integrate you into the communication path.”&lt;/p&gt;

&lt;h2&gt;
  
  
  Getting Work Done — Practical Points
&lt;/h2&gt;

&lt;p&gt;Remote teams have to work with unique considerations such as teams in different time zones. “I’ve managed and worked with people from APAC, North America and European time zones at the same time and scheduling a meeting for those three time zones simultaneously is nearly impossible. Someone is going to be up at midnight,” said Kate Taggard, engineering manager at &lt;a href="https://www.stripe.com"&gt;Stripe&lt;/a&gt;. Her solution? Limiting managers to choosing team members from two of the three time zones to make scheduling and working together easier.&lt;/p&gt;

&lt;p&gt;To this end, transitioning to a remote workforce means that it’s time to put collaboration and communication tools to work for you. Not only do they help you accomplish your work, but they ensure that your team communicates and is working in tandem with one another. &lt;a href="https://www.linkedin.com/in/swarnapodila/"&gt;Swarna Podila&lt;/a&gt;, senior director of community for the &lt;a href="https://www.cloudfoundry.org/foundation/"&gt;Cloud Foundry Foundation&lt;/a&gt; shared, “There is this pairing culture where engineers from different regions and time zones are paired together. They use Zoom calls and other tools they have found useful, like whiteboarding. I don’t personally whiteboard — I have reMarkable paper where I draw on it and it syncs up to my Google Drive which is already in a shared folder.”&lt;/p&gt;

&lt;p&gt;The panel, all of whom have engineering backgrounds, also recommended creating processes that are documented and communicated so all team members know what they are. From there, the group suggested their favorite tools, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://krisp.ai/"&gt;Krisp.ai&lt;/a&gt; which blocks background noise during calls.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.retrium.com/"&gt;Retrium&lt;/a&gt; which allows for easy retros for remote teams.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://about.gitlab.com/"&gt;GitLab&lt;/a&gt; for DevOps.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We may be working as remote teams for a longer period of time than originally anticipated. Putting in the effort now to help teams be successful is worth it — both to the people and the bottom line. Check out the full panel, “ &lt;a href="https://www.fairwinds.com/blog/remote-work-tips-and-tricks-for-your-engineering-team-panel-discussion"&gt;Remote Tips &amp;amp; Trips for Your Engineering Team&lt;/a&gt;.” And, be sure to add your favorite remote work tools to our list.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;a href="https://www.fairwinds.com/"&gt;&lt;strong&gt;Fairwinds&lt;/strong&gt;&lt;/a&gt;—The Kubernetes Enablement Company&lt;br&gt;
&lt;a href="https://www.fairwinds.com/clusterops"&gt;&lt;strong&gt;ClusterOps Managed Kubernetes&lt;/strong&gt;&lt;/a&gt;— ClusterOps is a fully-managed Kubernetes cluster management tool that integrates infrastructure as code, open source software, and SRE expertise as a subscription service.&lt;br&gt;
&lt;a href="https://www.fairwinds.com/clusterops-advisory"&gt;&lt;strong&gt;ClusterOps Kubernetes Advisory&lt;/strong&gt;&lt;/a&gt;—ClusterOps Advisory integrates Kubernetes expertise and open source software so you can confidently run reliable, scalable, and secure Kubernetes clusters.&lt;br&gt;
&lt;a href="https://www.fairwinds.com/insights"&gt;&lt;strong&gt;Fairwinds Insights&lt;/strong&gt;&lt;/a&gt;—We integrate trusted tools, collaboration workflows, and expertise into a single monitoring platform, so workloads always stay secure, reliable, and efficient.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>remote</category>
    </item>
  </channel>
</rss>
