Task 1
Task 1
Your cluster’s RBAC configuration controls which subjects can execute which verbs
on which resource types in which namespaces.The RBAC API includes four declarative
objects: Role, ClusterRole, RoleBinding, and ClusterRoleBinding.
A role binding is the bridge that ties a user, group of users, or a service account
(also known as subjects) to a role and grants those users the permissions defined
in that role. A cluster role binding ties a ClusterRole to all the namespaces in
your cluster. In this way, a RoleBinding assigns permissions within a namespace,
whereas a ClusterRoleBinding grants those permissions clusterwide.
It can be configured for a Pod or Container. Pod Security Policies are a cluster-
level Kubernetes resource that control the security context Pods can run with. If
PSPs are enabled for a cluster, any attempt to create a Pod which does not adhere
to its associated PSP will be rejected by the PSP admission controller.
The cornerstones of configuration management for containers and Kubernetes are the
following:
Network segmentation
By default, Kubernetes allows all pods within a cluster to communicate freely. This
makes application operations easier, but also creates a security risk. Although the
defaults are overly permissive, Kubernetes also has built-in enforcement
capabilities that can be configured to restrict communication between assets.
Network segmentation is a part of restricting communication between parts of the
deployment. Network segmentation is also required by some compliance frameworks,
including PCI-DSS.
Risk profiling
Risk profiling is the process of outlining the organization’s known security risks
and its policies and practices related to managing that risk.