Contents / Books |
| Hacking Kubernetes | | | By Andrew Martin, Michael Hausenblas [ ] [ ] |
| Kubernetes Security and Observability | | | by Brendan Creane, Amit Gupta [ ] |
| Security Observability with eBPF | | | by Jed Salazar and Natalia Reka Ivanko |
| amazon | | | Gray Hat Hacking, 6th Ed. (relevant chapters) By Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost [ ] |
Contents / Books / amazon |
| Ch 29. Hacking on Containers | | | [ ] |
| Ch 30. Hacking on Kubernetes | | | [ ] |
Contents / Books |
| Kubernetes Patterns, 2nd Edition, Part 5: Security Patterns | | | by Bilgin Ibryam and Roland Huss [ ] |
| Container Security Book | | | by Liz Rice [ ] |
Contents / Conferences |
| 2022 | | | eBPF Summit [ ] [ ] [ ] |
| CloudNative SecurityCon | | | |
Contents / Talks and videos / Detection |
| Keynote: Detecting Threats in GitHub with Falco | | | |
| Threat Hunting at Scale: Auditing Thousands of Clusters With Falco | | | |
| Security Kill Chain Stages in a 100k+ Daily Container Environment with Falco | | | |
| Falco to Pluginfinity and Beyond | | | |
| Purple Teaming Like Sky’s the Limit – Adversary Emulation in the Cloud | | | |
| Uncovering a Sophisticated Kubernetes Attack in Real Time Part II. | | | |
| Keeping your cluster safe from attacks with eBPF | | | |
| Threat Modeling Kubernetes: A Lightspeed Introduction | | | |
Contents / Talks and videos / Hardening |
| Securing Kubernetes Applications by Crafting Custom Seccomp Profiles | | | |
| The Hitchhiker's Guide to Pod Security | | | |
| You and Your Security Profiles; Generating Security Policies with the Help of eBPF | | | |
| Using the EBPF Superpowers To Generate Kubernetes Security Policies | | | |
| Komrade: an Open-Source Security Chaos Engineering (SCE) Tool for | | | |
Contents / Talks and videos / Attacks |
| Advanced Persistence Threats: The Future of Kubernetes Attacks | | | |
| Bypassing Falco: How to Compromise a Cluster without Tripping the SOC | | | |
| A Treasure Map of Hacking (and Defending) Kubernetes | | | |
| How Attackers Use Exposed Prometheus Server to Exploit | | | |
| Trampoline Pods: Node to Admin PrivEsc Built Into Popular K8s Plat | | | |
| Three Surprising K8s Networking “Features” and How to Defend Against Them | | | |
| A Compendium of Container Escapes | | | |
| The Path Less Traveled: Abusing Kubernetes Defaults | | | |
Contents / Talks and videos / Supply Chain |
| Securing Your Container Native Supply Chain with SLSA, Github and Te | | | |
| Keynote: Securing Shopify's Software Supply Chain - Shane Lawrence, Shopify | | | |
Contents / Talks and videos / Networking |
| Kubernetes Networking 101 (1h26m) | | | |
| A Guided Tour of Cilium Service Mesh | | | |
| Cilium: Welcome, Vision and Updates | | | |
| Cloud-Native Building Blocks: An Interactive Envoy Proxy Workshop (1h25m) | | | |
Contents / Blogs and Articles / Detection |
| Detecting a Container Escape with Cilium and eBPF | | | |
| Detecting and Blocking log4shell with Isovalent Cilium Enterprise | | | |
| Threat Hunting with Kubernetes Audit Logs | | | |
| Threat Hunting with Kubernetes Audit Logs - Part 2 | | | |
| Lateral movement risks in the cloud and how to prevent them – Part 2: from compromised container to cloud takeover | | | |
| Lateral movement risks in the cloud and how to prevent them – Part 3: from compromised cloud resource to Kubernetes cluster takeover | | | |
| Dive into BPF: a list of reading material | | | |
| Deep Dive into Real-World Kubernetes Threats | | | |
| Understanding Docker container escapes | | | |
| Consider All Microservices Vulnerable — And Monitor Their Behavior | | | |
| K8 Audit Logs | | | |
| Kubernetes Hunting & Visibility | | | |
| SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft | | | |
| Detecting Cryptomining Attacks in the wild | | | |
| Threat Alert: Kinsing Malware Attacks Targeting Container Environments | | | |
| TeamTNT Actively Enumerating Cloud Environments to Infiltrate Organizations | | | |
| TeamTNT Targeting AWS, Alibaba | | | |
| Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes | | | |
| Siloscape: First Known Malware Targeting Windows Containers to Compromise Cloud Environments | | | |
| CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes | | | |
Contents / Blogs and Articles / Hardening |
| NSA Kubernetes Hardening Guide | | | |
| Securing Kubernetes Clusters by Eliminating Risky Permissions | | | |
| Container security fundamentals: Exploring containers as processes | | | |
| Container security fundamentals part 2: Isolation & namespaces | | | |
| Kubernetes Security Checklist | | | |
| Under-documented Kubernetes Security Tips | | | |
Contents / Blogs and Articles / Attacks |
| Attacker persistence in Kubernetes using the TokenRequest API: Overview, detection, and prevention | | | |
| Tetragone: A Lesson in Security Fundamentals | | | |
| How I Hacked Play-with-Docker and Remotely Ran Code on the Host | | | |
| The Route to Root: Container Escape Using Kernel Exploitation | | | |
| (twitter thread)Quick and dirty way to get out of a privileged k8s pod or docker container by using cgroups release_agent feature. | | | |
| Bad Pods: Kubernetes Pod Privilege Escalation | | | [ ] |
| Kernel privilege escalation: how Kubernetes container isolation impacts privilege escalation attacks | | | |
| GKE Kubelet TLS Bootstrap Privilege Escalation | | | |
Contents / TTPs / Attack Matrices |
| MITRE ATT&CK Containers Matrix | | | |
| Threat matrix for Kubernetes | | | |
| Secure containerized environments with updated threat matrix for Kubernetes | | | |
| OWASP Kubernetes Top 10 | | | |
| OWASP Kubernetes Top 10 (Sysdig) | | | |
| AVOLENS Kubernetes Threat Matrix | | | |
Contents / Tools / Detection |
| falco | 7,460 | 11 months ago | |
| kube-bench | 7,129 | 11 months ago | |
| kubesec | 1,255 | 11 months ago | |
| security-guard | 65 | 11 months ago | |
| sysdig | 7,812 | 11 months ago | |
| tetragon | 3,694 | 11 months ago | |
| tracee | 3,657 | 11 months ago | |
| trivy | 24,010 | 11 months ago | |
Contents / Tools / Hardening |
| seccomp | | | "can be used to sandbox the privileges of a process, restricting the calls it is able to make from userspace into the kernel." |
| AppArmor | | | "AppArmor is a Linux kernel security module that supplements the standard Linux user and group based permissions to confine programs to a limited set of resources. AppArmor can be configured for any application to reduce its potential attack surface and provide greater in-depth defense." |
| Kubernetes Network Policy Recipes | 5,759 | over 1 year ago | |
| OPA Gatekeeper | 3,743 | 11 months ago | "A customizable cloud native policy controller that helps enforce policies and strengthen governance" |
Contents / Tools / Simulation / Experimentation |
| Stratus Red Team | 1,863 | 11 months ago | Stratus Red Team is "Atomic Red Team™" for the cloud, allowing to emulate offensive attack techniques in a granular and self-contained manner |
Contents / Tools / Simulation / Experimentation / Stratus Red Team |
| Kubernetes Attacks | 1,863 | 11 months ago | see |
Contents / Tools / Simulation / Experimentation |
| falcosecurity/event-generator | 97 | 11 months ago | |
| minikube | 29,636 | 11 months ago | minikube implements a local Kubernetes cluster on macOS, Linux, and Windows. minikube's primary goals are to be the best tool for local Kubernetes application development and to support all Kubernetes features that fit |
| controlplaneio/simulator | 937 | about 1 year ago | |
| kubernetes-goat | 4,542 | 11 months ago | |
| Sock Shop: A Microservices Demo Application | | | |
Contents / Tools / Attack |
| kubesploit | 1,130 | over 1 year ago | |
| Falco-bypasses | 79 | almost 2 years ago | |
| go-pillage-registries | 104 | almost 6 years ago | |
| ConMachi | 106 | almost 7 years ago | |
| peirates | 1,253 | about 1 year ago | |
| botb | 654 | about 2 years ago | |
| kubernetes-info.nse script | | | |
| kube-hunter | 4,774 | over 1 year ago | |
| MTKPI | 217 | about 1 year ago | |
Contents / Tools / Platforms |
| m9sweeper | 251 | over 1 year ago | "m9sweeper is a free and easy kubernetes security platform. It integrates industry-standard open source utilities into a one-stop-shop kubernetes security tool that can walk most kubernetes adminstrators through securing a kubernetes cluster as well as the apps running on the cluster." |
| anchore | | | "Software Composition Analysis from Code to Cloud: Enables security teams to find every piece of software in cloud native applications. Block and fix security issues in minutes rather than days." |
| Prisma Cloud Compute Edition (formerly Twistlock) | | | "Prisma Cloud secures applications from code to cloud, enabling security and DevOps teams to effectively collaborate to accelerate secure cloud-native application development and deployment." |
| sysdig | | | "Sysdig is a universal system visibility tool with native support for containers" |
| Aqua Security | | | "Unified Cloud Security: Accelerate secure innovation and protect your entire development lifecycle from code to cloud and back." |
Contents / Tools / Misc |
| kube-iptables-tailer | 552 | about 1 year ago | |
| inspektor-gadget | 2,292 | 11 months ago | |
Contents / Detection Rules and Analytics |
| Elastic kubernetes detection rules | 1,990 | 11 months ago | |
| Falco Rules | 99 | about 1 year ago | |
| Panther Labs gcp_k8s_rules | 346 | 11 months ago | |
| Sigma cloud/azure/kube*.yml | 8,490 | 11 months ago | |
| Sigma cloud/gcp/kube*.yml | 8,490 | 11 months ago | |
| Splunk Analytic Story: Kubernetes Scanning Activity | | | |
| Splunk Analytic Story: Kubernetes Sensitive Object Access Activity | | | |
| Tracee Signatures | 3,657 | 11 months ago | |
Contents / Detection Rules and Analytics / Projectdiscovery/nuclei-templates |
| technologies/kubernetes | 9,457 | 11 months ago | |
| exposed-panels/kube*.yaml | 9,457 | 11 months ago | |
| misconfiguration/kubernetes | 9,457 | 11 months ago | |
| exposures/configs/kube*.yaml | 9,457 | 11 months ago | |
Contents / People |
| @_fel1x | | | |
| @Antonlovesdnb | | | |
| @bibryam | | | |
| @bradgeesaman | | | |
| @christophetd | | | |
| @g3rzi | | | |
| @htejeda | | | |
| @iancoldwater | | | |
| @jrfastab | | | |
| @LachlanEvenson | | | |
| @lizrice | | | |
| @mhausenblas | | | |
| @mhausenblas | | | |
| @mosesrenegade | | | |
| @nataliaivanko | | | |
| @raesene | | | |
| @ramesh-ramani | | | |
| @randyabernethy | | | |
| @saschagrunert | | | |
| @sethsec | | | |
| @shaul-ben-hai | | | |
| @sshaybbc | | | |
| @Steph3nSims | | | |
| @sublimino | | | |
| @sussurro | | | |
| @sys_call | | | |
| @tgraf__ | | | |
| @tixxdz | | | |
| @tpapagian | | | |
| @willfindlay | | | |
| @yuvalavra | | | |
| @jimmesta | | | |