The final part of our nine-part blog series – where we examine each of the nine MITRE ATT&CK tactics and techniques for Kubernetes – analyzes a set of techniques that fall under the category known as Impact.

These techniques are aimed at disrupting or destroying resources and activity within the target environment, or in other words, the ultimate goal of an attacker. These include techniques to achieve data destruction, resource hijacking or denial of service.

StackRox helps protect against this tactic and its techniques with a wide range of capabilities that include:

  • scanning all container images that deploy into clusters
  • enforcing policies for image provenance
  • identifying Kubernetes vulnerabilities in clusters
  • monitoring Kubernetes configurations, RBAC access privileges, and runtime activity
  • and visualizing, simulating, and automatically generating Kubernetes Network Policies

You can find the first eight articles in the series below:

Technique 9.1: Data Destruction

Issue

This technique reflects the ability of an attacker to delete or remove resources in a Kubernetes cluster, including Deployments, configurations, nodes, pods, or other data.

Best Practice for Mitigation

Primary areas to configure security controls: Kubernetes and Cloud Provider

Kubernetes

Organizations can protect themselves from this threat vector by monitoring Kubernetes audit logs, which provide a chronological record of cluster events and restricting RBAC access according to the principle of least privilege.

Technique 9.2: Resource Hijacking

Issue

With this technique, an attacker may hijack a Kubernetes resource for unintended purposes. One example of this is using compromised containers to run malicious tasks such as cryptomining.

Real-world example: Microsoft Azure has disclosed the discovery of multiple campaigns, including a large-scale one, where attackers targeted Kubernetes clusters and were able to impact them by running cryptocurrency miners, otherwise known as “cryptojacking” attacks.

Best Practice for Mitigation

Primary area to configure security controls: Kubernetes and Cloud Provider

Kubernetes

Organizations can mitigate the threat of resource hijacking by configuring RBAC access to restrict the ability to create pods.

How StackRox Helps

StackRox helps protects organizations from resource hijacking by scanning all images that are used to deploy containers into the cluster and enforcing policies for image provenance. For example, many reported cryptojacking attacks have arisen from backdoored images stored in public registries containing malicious software. StackRox also monitors runtime activity with a built-in policy to detect cryptomining processes that execute.

Technique 9.3: Denial of service

Issue

With this technique, an attacker may seek to make services unavailable by impacting the availability of components within the Kubernetes control plane including the API server, cluster nodes, or application components in pods, or other resources.

Real-world example: CVE-2019-1002100 is a vulnerability in the Kubernetes API server that allows users with certain write permissions on the Kubernetes API to make write requests that cause the API server to utilize excessive resources, resulting in a denial of service.

Best Practice for Mitigation

Primary areas to configure security controls: Kubernetes and Cloud Provider

Kubernetes

Organizations can mitigate this threat by first ensuring they upgrade to the latest version of Kubernetes. Additionally, they can configure Kubernetes Network Policies to permit only necessary connections within the pod network.

How StackRox Helps

StackRox delivers protections to help mitigate this threat by automatically identifying Kubernetes vulnerabilities as well as visualizing, simulating, and automatically generating Kubernetes Network Policies to segment and restrict communication throughout the environment.

Final Thoughts

Kubernetes is enabling organization of every size across every industry in their efforts to modernize applications and infrastructure as part of strategic digital transformation efforts. Using Kubernetes, companies are now able to build and run applications at faster and at greater scale than previously possible. At the same time, Kubernetes creates a new threat environment that is complex and not yet well understood, giving rise to emerging and evolving attack vectors. The Kubernetes attack matrix provides an important, starting foundation for the Kubernetes community and cloud-native ecosystem to effectively protect Kubernetes, and the applications that run on it, from common tactics and techniques that might be used by adversaries.

The rich set of security controls made available by both Kubernetes and cloud provider platforms lend themselves to a set of security best practices that organizations can implement to mitigate the threats described in the Kubernetes attack matrix. This aligns with established frameworks for security such as the shared responsibility model for cloud environments.

To comprehensively mitigate the threats listed in the attack matrix requires a security approach that goes beyond being container-centric. It requires security that is Kubernetes-native: security that is fully architected to integrate with and leverage native security controls within Kubernetes itself.

New Kubernetes attack vectors will continue to be discovered over time alongside the growth of the platform, and organizations should be prepared to expand their Kubernetes security efforts over time to accommodate these developments. StackRox’s Kubernetes-native security is designed to address new threats to Kubernetes applications and infrastructure as they emerge.


저자 소개

Wei Lien Dang is Senior Director of Product and Marketing for Red Hat Advanced Cluster Security for Kubernetes. He was a co-founder at StackRox, which was acquired by Red Hat. Before his time at StackRox, Dang was Head of Product at CoreOS and held senior product management roles for security and cloud infrastructure at Amazon Web Services, Splunk, and Bracket Computing. He was also part of the investment team at the venture capital firm Andreessen Horowitz.

Dang holds an MBA with high distinction from Harvard Business School and a BS in Applied Physics with honors from Caltech.

UI_Icon-Red_Hat-Close-A-Black-RGB

채널별 검색

automation icon

오토메이션

기술, 팀, 인프라를 위한 IT 자동화 최신 동향

AI icon

인공지능

고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트

open hybrid cloud icon

오픈 하이브리드 클라우드

하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요

security icon

보안

환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보

edge icon

엣지 컴퓨팅

엣지에서의 운영을 단순화하는 플랫폼 업데이트

Infrastructure icon

인프라

세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보

application development icon

애플리케이션

복잡한 애플리케이션에 대한 솔루션 더 보기

Virtualization icon

가상화

온프레미스와 클라우드 환경에서 워크로드를 유연하게 운영하기 위한 엔터프라이즈 가상화의 미래