Kubernetes - Do I need to some additional hardening steps?Find pod rescheduling events in Kubernetes / GKECan Kubernetes be used like Docker Compose?How can I route traffic through a custom proxy to my kubernetes container?Kubernetes vs Google Container Engine: How to use autoscaling?Authenticating Kubernetes API(NodeJS) client using certificate not successfulKubernetes dashboard tls certificates on AWSKubernetes NetworkPolicy allow loadbalancerTLS handshake timeout with kubernetes in GKEkubernetes connection refused during deploymentHow to integrate Kubernetes Service Type “LoadBalancer” with Specific Cloud Load Balancers

Summoning A Technology Based Demon

Complaints from (junior) developers against solution architects: how can we show the benefits of our work and improve relationships?

In syntax, why cannot we say things like "he took walked at the park"? but can say "he took a walk at the park"?

Accidentally deleted everything from a directory on my Macbook using terminal

Exploiting the delay when a festival ticket is scanned

8086 stack segment and avoiding overflow in interrupts

Convert graph format for Mathematica graph functions

Just how much information should you share with a former client?

Can a US President, after impeachment and removal, be re-elected or re-appointed?

Is The Venice Syndrome documentary cover photo real?

Who said "one can be a powerful king with a very small sceptre"?

Would people understand me speaking German all over Europe?

What are the closest international airports in different countries?

What is a good example for artistic ND filter applications?

Omnidirectional LED, is it possible?

A variant of the Multiple Traveling Salesman Problem

How to innovate in OR

How do I make my photos have more impact?

90s/2000s TV show : man uses government time machine to fix national problems

What would the United Kingdom's "optimal" Brexit deal look like?

How should I quote American English speakers in a British English essay?

What is the German equivalent of the proverb 水清ければ魚棲まず (if the water is clear, fish won't live there)?

Why does the Rust compiler not optimize code assuming that two mutable references cannot alias?

Why were contact sensors put on three of the Lunar Module's four legs? Did they ever bend and stick out sideways?



Kubernetes - Do I need to some additional hardening steps?


Find pod rescheduling events in Kubernetes / GKECan Kubernetes be used like Docker Compose?How can I route traffic through a custom proxy to my kubernetes container?Kubernetes vs Google Container Engine: How to use autoscaling?Authenticating Kubernetes API(NodeJS) client using certificate not successfulKubernetes dashboard tls certificates on AWSKubernetes NetworkPolicy allow loadbalancerTLS handshake timeout with kubernetes in GKEkubernetes connection refused during deploymentHow to integrate Kubernetes Service Type “LoadBalancer” with Specific Cloud Load Balancers






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;








-1















Basically I'm new to kubernetes and I'm trying to create a simple nginx + php-fpm application. I've setup the deployment config, created the pods, setup some loadbalancers, etc.. Everything's working fine and I'm controlling the cluster from Google Cloud Shell (because the cluster is created on Google Cloud Platform). I want to ask if I need to do some additional steps or if my cluster is safe and secure, for example: can someone connect to it from outside by some way, etc.. I've kept the default settings while creating the cluster and I have client certificate enabled (that's a way of authentication, right?). I just want to make sure. (should it be secure by default?)










share|improve this question



















  • 1





    Could you make your question a bit more specific? Right now it might help you to do a bit of research online and figure out what you want to know.

    – cookiedough
    Mar 26 at 20:45











  • Yes, I will do some research on this, but it should be secure now too, not? (it's not like it's unsecure, right?)

    – JumpakCoding
    Mar 26 at 20:53











  • You can consider using private clusters if you are worried about the node external IP's. However I am currently deploying multiple nginx, php-fpm apps on a default GKE cluster and had to complaints. I do recommend looking into your cluster design, you might want to have the connection with the external tools airtight. It would help me to assist you better if you share your infra.

    – cookiedough
    Mar 26 at 21:01












  • Umm what do you mean by "infrastructure"?

    – JumpakCoding
    Mar 27 at 13:37

















-1















Basically I'm new to kubernetes and I'm trying to create a simple nginx + php-fpm application. I've setup the deployment config, created the pods, setup some loadbalancers, etc.. Everything's working fine and I'm controlling the cluster from Google Cloud Shell (because the cluster is created on Google Cloud Platform). I want to ask if I need to do some additional steps or if my cluster is safe and secure, for example: can someone connect to it from outside by some way, etc.. I've kept the default settings while creating the cluster and I have client certificate enabled (that's a way of authentication, right?). I just want to make sure. (should it be secure by default?)










share|improve this question



















  • 1





    Could you make your question a bit more specific? Right now it might help you to do a bit of research online and figure out what you want to know.

    – cookiedough
    Mar 26 at 20:45











  • Yes, I will do some research on this, but it should be secure now too, not? (it's not like it's unsecure, right?)

    – JumpakCoding
    Mar 26 at 20:53











  • You can consider using private clusters if you are worried about the node external IP's. However I am currently deploying multiple nginx, php-fpm apps on a default GKE cluster and had to complaints. I do recommend looking into your cluster design, you might want to have the connection with the external tools airtight. It would help me to assist you better if you share your infra.

    – cookiedough
    Mar 26 at 21:01












  • Umm what do you mean by "infrastructure"?

    – JumpakCoding
    Mar 27 at 13:37













-1












-1








-1








Basically I'm new to kubernetes and I'm trying to create a simple nginx + php-fpm application. I've setup the deployment config, created the pods, setup some loadbalancers, etc.. Everything's working fine and I'm controlling the cluster from Google Cloud Shell (because the cluster is created on Google Cloud Platform). I want to ask if I need to do some additional steps or if my cluster is safe and secure, for example: can someone connect to it from outside by some way, etc.. I've kept the default settings while creating the cluster and I have client certificate enabled (that's a way of authentication, right?). I just want to make sure. (should it be secure by default?)










share|improve this question














Basically I'm new to kubernetes and I'm trying to create a simple nginx + php-fpm application. I've setup the deployment config, created the pods, setup some loadbalancers, etc.. Everything's working fine and I'm controlling the cluster from Google Cloud Shell (because the cluster is created on Google Cloud Platform). I want to ask if I need to do some additional steps or if my cluster is safe and secure, for example: can someone connect to it from outside by some way, etc.. I've kept the default settings while creating the cluster and I have client certificate enabled (that's a way of authentication, right?). I just want to make sure. (should it be secure by default?)







kubernetes google-kubernetes-engine






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Mar 26 at 20:40









JumpakCodingJumpakCoding

293 bronze badges




293 bronze badges










  • 1





    Could you make your question a bit more specific? Right now it might help you to do a bit of research online and figure out what you want to know.

    – cookiedough
    Mar 26 at 20:45











  • Yes, I will do some research on this, but it should be secure now too, not? (it's not like it's unsecure, right?)

    – JumpakCoding
    Mar 26 at 20:53











  • You can consider using private clusters if you are worried about the node external IP's. However I am currently deploying multiple nginx, php-fpm apps on a default GKE cluster and had to complaints. I do recommend looking into your cluster design, you might want to have the connection with the external tools airtight. It would help me to assist you better if you share your infra.

    – cookiedough
    Mar 26 at 21:01












  • Umm what do you mean by "infrastructure"?

    – JumpakCoding
    Mar 27 at 13:37












  • 1





    Could you make your question a bit more specific? Right now it might help you to do a bit of research online and figure out what you want to know.

    – cookiedough
    Mar 26 at 20:45











  • Yes, I will do some research on this, but it should be secure now too, not? (it's not like it's unsecure, right?)

    – JumpakCoding
    Mar 26 at 20:53











  • You can consider using private clusters if you are worried about the node external IP's. However I am currently deploying multiple nginx, php-fpm apps on a default GKE cluster and had to complaints. I do recommend looking into your cluster design, you might want to have the connection with the external tools airtight. It would help me to assist you better if you share your infra.

    – cookiedough
    Mar 26 at 21:01












  • Umm what do you mean by "infrastructure"?

    – JumpakCoding
    Mar 27 at 13:37







1




1





Could you make your question a bit more specific? Right now it might help you to do a bit of research online and figure out what you want to know.

– cookiedough
Mar 26 at 20:45





Could you make your question a bit more specific? Right now it might help you to do a bit of research online and figure out what you want to know.

– cookiedough
Mar 26 at 20:45













Yes, I will do some research on this, but it should be secure now too, not? (it's not like it's unsecure, right?)

– JumpakCoding
Mar 26 at 20:53





Yes, I will do some research on this, but it should be secure now too, not? (it's not like it's unsecure, right?)

– JumpakCoding
Mar 26 at 20:53













You can consider using private clusters if you are worried about the node external IP's. However I am currently deploying multiple nginx, php-fpm apps on a default GKE cluster and had to complaints. I do recommend looking into your cluster design, you might want to have the connection with the external tools airtight. It would help me to assist you better if you share your infra.

– cookiedough
Mar 26 at 21:01






You can consider using private clusters if you are worried about the node external IP's. However I am currently deploying multiple nginx, php-fpm apps on a default GKE cluster and had to complaints. I do recommend looking into your cluster design, you might want to have the connection with the external tools airtight. It would help me to assist you better if you share your infra.

– cookiedough
Mar 26 at 21:01














Umm what do you mean by "infrastructure"?

– JumpakCoding
Mar 27 at 13:37





Umm what do you mean by "infrastructure"?

– JumpakCoding
Mar 27 at 13:37












1 Answer
1






active

oldest

votes


















2














Consider what exactly you are "hardening" against; you can consider security from two contexts: application and cluster. They are usually decoupled, but can cause some serious problems if either gets compromised.



For cluster security, there are many options on GKE to restrict access to your cluster that covers the majority of use-cases. You can use RBAC (Role-based access control) to limit user and service account permissions and prevent unauthorized access/modification to your cluster resources. Additionally, if you use external tool (eg. Helm), you will need to secure these individually. By default, only those with the client certificate should be able to access your master. If you share the certificate, or if another user in your Google Organizations account has the IAM permissions to access your cluster, they could also grab permissions from the Google Cloud CLI. A good cluster security enforcement can greatly mitigate the effects of a compromised container/pod.



For application security, follow the best practices for deploying containerized applications and secret management. Basically secure your nginx and php as you would on traditional servers.



Hope this helps!






share|improve this answer



























  • I'm hardening against "cluster security", so if I keep the cluster like this and make sure I hide the certificate from anyone and someone gets the IP addresses of the clusters (in the outside internet) it should be secure, and no one can connect to it unless I share the client certificate or someone gets into my Google Cloud Platform account, do I understand it correctly? By connecting to the cluster I mean someone connecting to it for example using kubectl and controlling something..

    – JumpakCoding
    Mar 27 at 13:35












  • For a GKE cluster, it should be sufficiently robust for what you hope to accomplish; just be careful when using external tools like Helm/Tiller. Your understanding is correct.

    – Frank Yucheng Gu
    Mar 27 at 15:48











  • Yes I don't use any external tools.

    – JumpakCoding
    Mar 27 at 16:49










Your Answer






StackExchange.ifUsing("editor", function ()
StackExchange.using("externalEditor", function ()
StackExchange.using("snippets", function ()
StackExchange.snippets.init();
);
);
, "code-snippets");

StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "1"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













draft saved

draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f55365860%2fkubernetes-do-i-need-to-some-additional-hardening-steps%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









2














Consider what exactly you are "hardening" against; you can consider security from two contexts: application and cluster. They are usually decoupled, but can cause some serious problems if either gets compromised.



For cluster security, there are many options on GKE to restrict access to your cluster that covers the majority of use-cases. You can use RBAC (Role-based access control) to limit user and service account permissions and prevent unauthorized access/modification to your cluster resources. Additionally, if you use external tool (eg. Helm), you will need to secure these individually. By default, only those with the client certificate should be able to access your master. If you share the certificate, or if another user in your Google Organizations account has the IAM permissions to access your cluster, they could also grab permissions from the Google Cloud CLI. A good cluster security enforcement can greatly mitigate the effects of a compromised container/pod.



For application security, follow the best practices for deploying containerized applications and secret management. Basically secure your nginx and php as you would on traditional servers.



Hope this helps!






share|improve this answer



























  • I'm hardening against "cluster security", so if I keep the cluster like this and make sure I hide the certificate from anyone and someone gets the IP addresses of the clusters (in the outside internet) it should be secure, and no one can connect to it unless I share the client certificate or someone gets into my Google Cloud Platform account, do I understand it correctly? By connecting to the cluster I mean someone connecting to it for example using kubectl and controlling something..

    – JumpakCoding
    Mar 27 at 13:35












  • For a GKE cluster, it should be sufficiently robust for what you hope to accomplish; just be careful when using external tools like Helm/Tiller. Your understanding is correct.

    – Frank Yucheng Gu
    Mar 27 at 15:48











  • Yes I don't use any external tools.

    – JumpakCoding
    Mar 27 at 16:49















2














Consider what exactly you are "hardening" against; you can consider security from two contexts: application and cluster. They are usually decoupled, but can cause some serious problems if either gets compromised.



For cluster security, there are many options on GKE to restrict access to your cluster that covers the majority of use-cases. You can use RBAC (Role-based access control) to limit user and service account permissions and prevent unauthorized access/modification to your cluster resources. Additionally, if you use external tool (eg. Helm), you will need to secure these individually. By default, only those with the client certificate should be able to access your master. If you share the certificate, or if another user in your Google Organizations account has the IAM permissions to access your cluster, they could also grab permissions from the Google Cloud CLI. A good cluster security enforcement can greatly mitigate the effects of a compromised container/pod.



For application security, follow the best practices for deploying containerized applications and secret management. Basically secure your nginx and php as you would on traditional servers.



Hope this helps!






share|improve this answer



























  • I'm hardening against "cluster security", so if I keep the cluster like this and make sure I hide the certificate from anyone and someone gets the IP addresses of the clusters (in the outside internet) it should be secure, and no one can connect to it unless I share the client certificate or someone gets into my Google Cloud Platform account, do I understand it correctly? By connecting to the cluster I mean someone connecting to it for example using kubectl and controlling something..

    – JumpakCoding
    Mar 27 at 13:35












  • For a GKE cluster, it should be sufficiently robust for what you hope to accomplish; just be careful when using external tools like Helm/Tiller. Your understanding is correct.

    – Frank Yucheng Gu
    Mar 27 at 15:48











  • Yes I don't use any external tools.

    – JumpakCoding
    Mar 27 at 16:49













2












2








2







Consider what exactly you are "hardening" against; you can consider security from two contexts: application and cluster. They are usually decoupled, but can cause some serious problems if either gets compromised.



For cluster security, there are many options on GKE to restrict access to your cluster that covers the majority of use-cases. You can use RBAC (Role-based access control) to limit user and service account permissions and prevent unauthorized access/modification to your cluster resources. Additionally, if you use external tool (eg. Helm), you will need to secure these individually. By default, only those with the client certificate should be able to access your master. If you share the certificate, or if another user in your Google Organizations account has the IAM permissions to access your cluster, they could also grab permissions from the Google Cloud CLI. A good cluster security enforcement can greatly mitigate the effects of a compromised container/pod.



For application security, follow the best practices for deploying containerized applications and secret management. Basically secure your nginx and php as you would on traditional servers.



Hope this helps!






share|improve this answer















Consider what exactly you are "hardening" against; you can consider security from two contexts: application and cluster. They are usually decoupled, but can cause some serious problems if either gets compromised.



For cluster security, there are many options on GKE to restrict access to your cluster that covers the majority of use-cases. You can use RBAC (Role-based access control) to limit user and service account permissions and prevent unauthorized access/modification to your cluster resources. Additionally, if you use external tool (eg. Helm), you will need to secure these individually. By default, only those with the client certificate should be able to access your master. If you share the certificate, or if another user in your Google Organizations account has the IAM permissions to access your cluster, they could also grab permissions from the Google Cloud CLI. A good cluster security enforcement can greatly mitigate the effects of a compromised container/pod.



For application security, follow the best practices for deploying containerized applications and secret management. Basically secure your nginx and php as you would on traditional servers.



Hope this helps!







share|improve this answer














share|improve this answer



share|improve this answer








edited Mar 27 at 10:12









Adrian nieto macias

706 bronze badges




706 bronze badges










answered Mar 26 at 21:08









Frank Yucheng GuFrank Yucheng Gu

1,11513 bronze badges




1,11513 bronze badges















  • I'm hardening against "cluster security", so if I keep the cluster like this and make sure I hide the certificate from anyone and someone gets the IP addresses of the clusters (in the outside internet) it should be secure, and no one can connect to it unless I share the client certificate or someone gets into my Google Cloud Platform account, do I understand it correctly? By connecting to the cluster I mean someone connecting to it for example using kubectl and controlling something..

    – JumpakCoding
    Mar 27 at 13:35












  • For a GKE cluster, it should be sufficiently robust for what you hope to accomplish; just be careful when using external tools like Helm/Tiller. Your understanding is correct.

    – Frank Yucheng Gu
    Mar 27 at 15:48











  • Yes I don't use any external tools.

    – JumpakCoding
    Mar 27 at 16:49

















  • I'm hardening against "cluster security", so if I keep the cluster like this and make sure I hide the certificate from anyone and someone gets the IP addresses of the clusters (in the outside internet) it should be secure, and no one can connect to it unless I share the client certificate or someone gets into my Google Cloud Platform account, do I understand it correctly? By connecting to the cluster I mean someone connecting to it for example using kubectl and controlling something..

    – JumpakCoding
    Mar 27 at 13:35












  • For a GKE cluster, it should be sufficiently robust for what you hope to accomplish; just be careful when using external tools like Helm/Tiller. Your understanding is correct.

    – Frank Yucheng Gu
    Mar 27 at 15:48











  • Yes I don't use any external tools.

    – JumpakCoding
    Mar 27 at 16:49
















I'm hardening against "cluster security", so if I keep the cluster like this and make sure I hide the certificate from anyone and someone gets the IP addresses of the clusters (in the outside internet) it should be secure, and no one can connect to it unless I share the client certificate or someone gets into my Google Cloud Platform account, do I understand it correctly? By connecting to the cluster I mean someone connecting to it for example using kubectl and controlling something..

– JumpakCoding
Mar 27 at 13:35






I'm hardening against "cluster security", so if I keep the cluster like this and make sure I hide the certificate from anyone and someone gets the IP addresses of the clusters (in the outside internet) it should be secure, and no one can connect to it unless I share the client certificate or someone gets into my Google Cloud Platform account, do I understand it correctly? By connecting to the cluster I mean someone connecting to it for example using kubectl and controlling something..

– JumpakCoding
Mar 27 at 13:35














For a GKE cluster, it should be sufficiently robust for what you hope to accomplish; just be careful when using external tools like Helm/Tiller. Your understanding is correct.

– Frank Yucheng Gu
Mar 27 at 15:48





For a GKE cluster, it should be sufficiently robust for what you hope to accomplish; just be careful when using external tools like Helm/Tiller. Your understanding is correct.

– Frank Yucheng Gu
Mar 27 at 15:48













Yes I don't use any external tools.

– JumpakCoding
Mar 27 at 16:49





Yes I don't use any external tools.

– JumpakCoding
Mar 27 at 16:49






Got a question that you can’t ask on public Stack Overflow? Learn more about sharing private information with Stack Overflow for Teams.







Got a question that you can’t ask on public Stack Overflow? Learn more about sharing private information with Stack Overflow for Teams.



















draft saved

draft discarded
















































Thanks for contributing an answer to Stack Overflow!


  • Please be sure to answer the question. Provide details and share your research!

But avoid


  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.

To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f55365860%2fkubernetes-do-i-need-to-some-additional-hardening-steps%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Kamusi Yaliyomo Aina za kamusi | Muundo wa kamusi | Faida za kamusi | Dhima ya picha katika kamusi | Marejeo | Tazama pia | Viungo vya nje | UrambazajiKuhusu kamusiGo-SwahiliWiki-KamusiKamusi ya Kiswahili na Kiingerezakuihariri na kuongeza habari

Swift 4 - func physicsWorld not invoked on collision? The Next CEO of Stack OverflowHow to call Objective-C code from Swift#ifdef replacement in the Swift language@selector() in Swift?#pragma mark in Swift?Swift for loop: for index, element in array?dispatch_after - GCD in Swift?Swift Beta performance: sorting arraysSplit a String into an array in Swift?The use of Swift 3 @objc inference in Swift 4 mode is deprecated?How to optimize UITableViewCell, because my UITableView lags

Access current req object everywhere in Node.js ExpressWhy are global variables considered bad practice? (node.js)Using req & res across functionsHow do I get the path to the current script with Node.js?What is Node.js' Connect, Express and “middleware”?Node.js w/ express error handling in callbackHow to access the GET parameters after “?” in Express?Modify Node.js req object parametersAccess “app” variable inside of ExpressJS/ConnectJS middleware?Node.js Express app - request objectAngular Http Module considered middleware?Session variables in ExpressJSAdd properties to the req object in expressjs with Typescript