Skip to main content

63 docs tagged with "CKS"

View all tags

audit2rbac

audit2rbac automatically generates RBAC policies from Kubernetes audit logs, enabling precise least-privilege configurations based on actual API usage.

Cloud Metadata Service Abuse

How attackers exploit cloud provider metadata services (IMDS) from Kubernetes pods to steal IAM credentials and escalate privileges.

cnspec

cnspec is a cloud-native security scanner from Mondoo that assesses Kubernetes clusters, containers, and infrastructure against security policies and compliance frameworks.

Compromised API Server

Exploiting Kubernetes API server vulnerabilities and how attackers gain unauthorized access.

Compromised Sidecars

How attackers exploit insecure or malicious sidecar containers to intercept data, escalate privileges, and persist within Kubernetes clusters.

Container Escape

How an attacker can break out of a container and gain control over the host system in Kubernetes.

Cosign

Cosign is a container signing and verification tool used to secure container images and enforce supply chain integrity.

Deepfence ThreatMapper

Deepfence ThreatMapper is a runtime vulnerability scanner that discovers threats across Kubernetes clusters, VMs, containers, and serverless environments.

DNS Security in Kubernetes

Protect CoreDNS from spoofing, cache poisoning, DNS tunneling, and unauthorized modifications to enhance Kubernetes cluster security.

Egress Control in Kubernetes

Restrict and monitor outbound traffic from Kubernetes workloads to prevent data exfiltration, command-and-control communication, and unauthorized external access.

Ephemeral Debug Container Abuse

How attackers abuse kubectl debug and ephemeral containers to inject debugging tools, access process namespaces, and compromise Kubernetes workloads.

Exec/Attach Credential Theft

Attack scenario demonstrating how kubectl exec and attach commands can be abused to steal credentials and sensitive data from running containers.

Exposed Kubelet API

How an exposed Kubelet API can be exploited to execute commands on nodes and compromise Kubernetes clusters.

Falco

Falco is a runtime security tool for Kubernetes that detects abnormal behavior and threats based on system call monitoring and security rules.

ImagePullSecrets Theft

Attack scenario demonstrating how attackers extract image pull secrets to gain unauthorized access to private container registries.

Insecure CSI Drivers

How attackers exploit insecure Container Storage Interface (CSI) drivers to gain unauthorized access to persistent volumes and sensitive data.

Insecure RBAC Permissions

How overly permissive Kubernetes RBAC configurations enable privilege escalation and full cluster compromise.

Insecure Secrets Management

Understanding the risks of insecure secrets management in Kubernetes and how it can lead to sensitive data exposure.

KBOM

KBOM (Kubernetes Bill of Materials) Toolkit generates comprehensive inventories of Kubernetes clusters, including components, images, and configurations.

kube-psp-advisor

kube-psp-advisor generates Pod Security Policies and Pod Security Standards based on the actual security requirements of running workloads.

kube-scan

kube-scan is a Kubernetes risk assessment tool that calculates risk scores for workloads based on their security configurations and potential attack impact.

kubectl-bindrole

kubectl-bindrole finds all Kubernetes roles and cluster roles bound to a specified ServiceAccount, User, or Group, helping audit RBAC configurations.

kubectl-dig

kubectl-dig provides deep visibility into Kubernetes cluster activity using eBPF-based tracing, enabling real-time analysis of system calls and network traffic.

kubectl-kubesec

kubectl-kubesec is a kubectl plugin that scans Kubernetes resources using kubesec.io to identify security risks and provide hardening recommendations.

kubectl-who-can

kubectl-who-can shows which subjects have RBAC permissions to perform specific actions on Kubernetes resources, helping identify privilege distribution.

Kubei

Kubei is a Kubernetes runtime vulnerability scanner that identifies vulnerabilities in container images across your cluster in real-time.

Kubelet Security Overview

Overview of Kubernetes Kubelet security covering authentication, authorization, TLS, resource limits, and hardening best practices.

Kubernetes Attack Vectors

Comprehensive guide to Kubernetes attack vectors including container escapes, privilege escalation, RBAC exploitation, and cluster compromise techniques.

Kubernetes External Secrets

Kubernetes External Secrets Operator synchronizes secrets from external providers like AWS Secrets Manager, HashiCorp Vault, and Azure Key Vault into Kubernetes.

kubernetes-rbac-audit

kubernetes-rbac-audit is an auditing tool that analyzes RBAC configurations to identify risky permissions and potential security misconfigurations.

Lack of Network Policies

How missing Kubernetes Network Policies enable lateral movement and data exfiltration by attackers.

netchecks

netchecks validates network connectivity assumptions in Kubernetes clusters by running declarative network tests to verify policies and connectivity.

Network Policies

Explore how Network Policies in Kubernetes control traffic flow and enhance security.

Persistent Volume Data Exposure

How attackers exploit misconfigured PersistentVolumes to access sensitive data from other workloads or previously deleted pods in Kubernetes.

Pod Security Standards (PSS)

Learn how Kubernetes Pod Security Standards (PSS) enforce security controls for workloads and replace the deprecated Pod Security Policies (PSP).

Privileged Service Accounts

How attackers exploit overly privileged Kubernetes Service Accounts to gain cluster-wide access and escalate privileges.

rakkess

rakkess displays an access matrix showing which Kubernetes resources a user, group, or service account can access, providing a comprehensive RBAC overview.

rback

rback generates visual diagrams of Kubernetes RBAC configurations, making it easier to understand and audit complex permission structures.

Securing Debug Container Access

How to control ephemeral container and kubectl debug access through RBAC, Pod Security Standards, and admission control in Kubernetes.

Securing Persistent Volumes

How to protect Kubernetes PersistentVolumes from unauthorized access, data exposure, and cross-namespace attacks through proper configuration and RBAC.

Service Accounts

Learn how Kubernetes Service Accounts provide authentication for pods and how to securely configure them using RBAC.

Service Mesh Security

Improve Kubernetes security by implementing mutual TLS (mTLS), zero-trust networking, and policy-based access control using service meshes like Istio, Linkerd, and Cilium.

Steampipe for Kubernetes

Steampipe enables SQL-based querying of Kubernetes resources and compliance scanning using the steampipe-kubernetes plugin and compliance mod.

Supply Chain Attacks

How attackers compromise container images, dependencies, CI/CD pipelines, and Helm charts to infiltrate Kubernetes clusters.

Traffic Hijacking

How attackers manipulate Kubernetes network traffic to intercept, redirect, or disrupt communication between workloads.

Trivy

Overview, usage, and best practices for using Trivy to scan container images, file systems, and Kubernetes resources for vulnerabilities.

Trivy Operator

Trivy Operator provides Kubernetes-native security scanning by automatically scanning workloads for vulnerabilities, misconfigurations, secrets, and RBAC issues.

Unrestricted etcd Access

How attackers exploit unrestricted access to etcd to retrieve Kubernetes secrets and take control of the cluster.

Unrestricted HostPath Mounts

How attackers exploit unrestricted hostPath mounts to gain access to the host filesystem and escalate privileges.

Vault Secrets Operator

Vault Secrets Operator is HashiCorp's official Kubernetes operator for synchronizing secrets from Vault into Kubernetes Secrets.