Securing Kubernetes Secrets (Cloud Next '19)

  Рет қаралды 19,997

Google Cloud Tech

Google Cloud Tech

Күн бұрын

Пікірлер: 11
@DustinDeus
@DustinDeus 4 жыл бұрын
32:20 I'm still confused. From point of view of the KMS plugin, it must be authenticated with the KMS provider. What prevents attackers to issue new tokens when they have access to running VM? **UPDATE:** I got it. _Kubernetes Service Accounts_ are used to assign pods the right to issue new KMS token to decrypt data for the application. This is indeed "magic" because Google Cloud IAM is used.
@shayberkovich8104
@shayberkovich8104 5 жыл бұрын
Not the best secret example at 7:53. Credit card numbers would be normally saved encrypted in database pod, not as a secret in Etcd. Now the password to that database pod would be a secret stored in Etcd.
@tunminster
@tunminster 5 жыл бұрын
I am fan of using kubernetes secret rather than Azure's Key vault or aws KMS or other third party key valut provider. why do i need to use the other key vault provider if kubernetes is already offered the similiar secret key stoarge?
@whykoks
@whykoks 4 жыл бұрын
Secret sprawl?
@guruprashanth_k
@guruprashanth_k 4 жыл бұрын
thats the reason why we need something like KMS because kubernetes secret are plain text that are stored at etcd level. correct me if I am wrong.
@evansoenke9026
@evansoenke9026 5 жыл бұрын
Very complex topic, expertly delivered explanation
@rafau99
@rafau99 4 жыл бұрын
how will you edit the values in secrets and push them to repo? once you get the secret it's only encrypted with base64 so no encryption at all; or will you not push it to repo and manually , edit every time you want to change
@chaulaode
@chaulaode 3 жыл бұрын
can i have the slide?
@cptechno
@cptechno 5 жыл бұрын
This presentation does not talk about "secret" like ...kubectl create secret .... How is the latter protected?
@shayberkovich8104
@shayberkovich8104 5 жыл бұрын
You run kubectl from master node usually. This is protected by the same mechanisms as, say, access to root on host. If attacker has access to kubectl there is no point of making distinction between secrets and other K8 objects.
@nikolaykostadinov7108
@nikolaykostadinov7108 2 жыл бұрын
I still can't get his base64 joke
Using HashiCorp Vault with Kubernetes (Cloud Next '18)
48:56
Google Cloud Tech
Рет қаралды 33 М.
Quando A Diferença De Altura É Muito Grande 😲😂
00:12
Mari Maria
Рет қаралды 45 МЛН
BAYGUYSTAN | 1 СЕРИЯ | bayGUYS
36:55
bayGUYS
Рет қаралды 1,9 МЛН
When you have a very capricious child 😂😘👍
00:16
Like Asiya
Рет қаралды 18 МЛН
Арыстанның айқасы, Тәуіржанның шайқасы!
25:51
QosLike / ҚосЛайк / Косылайық
Рет қаралды 700 М.
HashiCorp Vault on GCP (Cloud Next '19)
21:53
Google Cloud Tech
Рет қаралды 8 М.
Kubernetes Security Best Practices - Ian Lewis, Google
28:53
CNCF [Cloud Native Computing Foundation]
Рет қаралды 51 М.
Cloud Networking for the Hybrid Enterprise (Cloud Next '19)
47:21
Google Cloud Tech
Рет қаралды 17 М.
Certifik8s: All You Need to Know About Certificates in Kubernetes [I] - Alexander Brand, Apprenda
35:57
CNCF [Cloud Native Computing Foundation]
Рет қаралды 45 М.
Cloud Load Balancing Deep Dive and Best Practices (Cloud Next '19)
50:49
Google Cloud Tech
Рет қаралды 47 М.
Kubernetes Security Best Practices - Ian Lewis (Google)
29:35
Container Camp
Рет қаралды 10 М.
Using GKE On-Prem to Manage Kubernetes in Your Datacenter (Cloud Next '19)
48:40
iPhone SE 2020 пролежал в коробке 4 года
0:54
ТЕХНОБЛОГ ГУБАРЕВ СЕРГЕЙ
Рет қаралды 3,5 МЛН
Samsung water test 💀☠️ #samsung #water #viralshort #edit
0:30