Skip to content

Commit dfc37c0

Browse files
add more links
1 parent 1208c83 commit dfc37c0

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

README.md

+10
Original file line numberDiff line numberDiff line change
@@ -123,6 +123,7 @@ A first good starting point for securing Kubernetes is the Task section [**Secur
123123
* [Using RBAC Authorization](https://kubernetes.io/docs/reference/access-authn-authz/rbac/)
124124
* [Authorization modes for Kubernetes API server](https://kubernetes.io/docs/reference/access-authn-authz/authorization/#authorization-modules)
125125
#### 3rd Party Ressources
126+
* [Site for Kubernetes RBAC](https://rbac.dev/)
126127
* [Understand Role-Based Access Control in Kubernetes](https://www.youtube.com/watch?v=G3R24JSlGjY)
127128
* [RBAC Study Guide](https://github.com/David-VTUK/CKA-StudyGuide/blob/master/RevisionTopics/Part-5-Security.md)
128129
</details>
@@ -219,6 +220,8 @@ A first good starting point for securing Kubernetes is the Task section [**Secur
219220
<details><summary>Use container runtime sandboxes in multi-tenant environments (e.g. gvisor, kata containers)</summary>
220221

221222
#### Allowed Ressources
223+
* [container runtime](https://kubernetes.io/docs/concepts/containers/runtime-class/)
224+
* [container runtime sandboxes examples](https://github.com/kubernetes/enhancements/blob/master/keps/sig-node/585-runtime-class/README.md#examples)
222225
* [Enforce tenant isolation (Limit Ranges, Quotas, PSPs) with Policies](https://kubernetes.io/docs/concepts/policy/)
223226
* [Affinity and anti-affinity](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity)
224227
#### 3rd Party Ressources
@@ -253,6 +256,7 @@ A first good starting point for securing Kubernetes is the Task section [**Secur
253256
* [distroless containers](https://github.com/GoogleContainerTools/distroless)
254257
* [Docker multi-stage builds](https://docs.docker.com/develop/develop-images/multistage-build/)
255258
* [Tips to Reduce Docker Image Sizes](https://hackernoon.com/tips-to-reduce-docker-image-sizes-876095da3b34)
259+
* [3 simple tricks for smaller Docker images](https://learnk8s.io/blog/smaller-docker-images)
256260
</details>
257261

258262
<details><summary>Secure your supply chain: whitelist allowed image registries, sign and validate images</summary>
@@ -271,6 +275,9 @@ A first good starting point for securing Kubernetes is the Task section [**Secur
271275

272276
<details><summary>Use static analysis of user workloads (e.g. kubernetes resources, docker files)</summary>
273277

278+
#### Allowed Ressources
279+
* [11 Ways (Not) to Get Hacked: statically-analyse-yaml](https://kubernetes.io/blog/2018/07/18/11-ways-not-to-get-hacked/#7-statically-analyse-yaml)
280+
274281
#### 3rd Party Ressources
275282
* [Static analysis with Clair](https://github.com/quay/clair)
276283
* [Static analysis with Kube-score](https://kube-score.com/)
@@ -316,6 +323,9 @@ A first good starting point for securing Kubernetes is the Task section [**Secur
316323
* [Anatomy of a Kubernetes attack – How untrusted Docker images fails us](https://www.optiv.com/explore-optiv-insights/source-zero/anatomy-kubernetes-attack-how-untrusted-docker-images-fail-us)
317324
* [Investigating Kubernetes Attack Scenarios in Threat Stack (part 1)](https://www.threatstack.com/blog/kubernetes-attack-scenarios-part-1)
318325
* [The seven phases of a cyber attack](https://www.dnvgl.com/article/the-seven-phases-of-a-cyber-attack-118270)
326+
* [Threat matrix for Kubernetes](https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/)
327+
* [MITRE ATT&CK framework for container runtime security with Falco](https://sysdig.com/blog/mitre-attck-framework-for-container-runtime-security-with-sysdig-falco/)
328+
* [Mitigating Kubernetes attacks](https://www.youtube.com/watch?v=HWv8ZKLCawM)
319329
</details>
320330

321331
<details><summary>Perform deep analytical investigation and identification of bad actors within environment</summary>

0 commit comments

Comments
 (0)