Section 6: Security
Section 6: Security
Authentication
○ Who can access ?
– LDAP
◆ Service accounts
Authorization
○ What can they do ?
❑ ABAC Authorization
◆ ABAC : Attribute Based Authentication.
❑ Node Authorization
❑ Webhook Mode
Service accounts
secret object.
◆ The secret object is linked to the service account.
◆ To view token, view the secret object by running :-
First delete the pod, edit the service account and recreate a new
one. In case of a deployment, you are able to change the service
account since pods will be recreated automatically after the
change.
○ Kubernetes auto-mounts the default service account to the pods.
v1.22
v1.24
one.
◆ It you attempt to decode the decode the token from
Network policies
3306.
◆ This policy blocks all other incoming traffic on other ports.
◆ Labels and selectors are used to link a network policy to a pod.
◆ Pod Labels :-
– Labels:
role : db
◆ Selectors in the network policy manifest file include
◆ PodSelector :-
– PodSelector:
matchLabels:
role : db
◆ NamespaceSelector :-
– namespaceSelector:
matchLabels:
name: prod
● NOTES :
○ Ingress or egress isolation comes into effect if you defined it in the
policyTypes property.
◆ If you only define ingress type, egress traffic will be unaffected
support it include :-
– Kube-router
– Calico
– Romana
– Weave-net