View on GitHub

ibm-security-workshop

IBM Security Workshop Labs

IKS Security Lab

Container Registry

IBM Cloud Container Registry helps you to store your docker images. These images can be either accessible by the public using public registry or the access can be restricted to certain users using private registry. Also, this registry allows only the IBM Cloud account users to access the images.

AccessKubernetes

AccessCluster

IKSCluster

AccessRegistry

PushImages

We already pushed some of the images from our demo application.

namespaces

repositories

DockerImages

Vulnerability Advisor

Vulnerability Advisor scans the security status of the docker images that are pushed to the registry namespace. When the image is added to the namespace, it will be scanned automatically by the vulnerability advisor to detect the security issues and potential vulnerabilities.

It will generate a report suggesting the fixes. You can also add exemptions based on your requirements. Fixing the issues that are reported can help you to secure your IBM Cloud infrastructure.

SecurityStatus

SecurityIssue

IssuesLocationImage

IssueFix

createExemption

createPolicy

policystatus

You can go to your Kubernetes cluster and access vulnerability advisor similar to the Registry.

AccessVA

PolicySettingsVA

Here, let us get the issue id of the vulnerability for the location service which is CVE-2019-5953 and you can see it in the above steps.

createExemptionVA

oktodeployVAexemption

Protecting Sensitive information

Sometimes, you may have sensitive data on your cluster. This may be at application level or cluster level.

At cluster level, all the configuration data will be stored in the etcd component which in turn will be saved on local disk of kubernetes master.

At application level, all the confidential information such as usr names, passwords etc. are stored as Kubernetes secrets.

Inorder to protect the etcd data on the local disk of your kubernetes master and also the kubernetes secrets, you can enable IBM Key Protect encryption.

keyProtectEncryption

EnableSecretEncryption

Below are some other security features. We are not walking through them today in this lab, but you can give them a try if you are interested.