Skip to Content
Hacking Kubernetes
book

Hacking Kubernetes

by Andrew Martin, Michael Hausenblas
October 2021
Intermediate to advanced
311 pages
7h 52m
English
O'Reilly Media, Inc.
Book available
Content preview from Hacking Kubernetes

Chapter 3. Container Runtime Isolation

Linux has evolved sandboxing and isolation techniques beyond simple virtual machines (VMs) that strengthen it from current and future vulnerabilities. Sometimes these sandboxes are called micro VMs.

These sandboxes combine parts of all previous container and VM approaches. You would use them to protect sensitive workloads and data, as they focus on rapid deployment and high performance on shared infrastructure.

In this chapter we’ll discuss different types of micro VMs that use virtual machines and containers together, to protect your running Linux kernel and userspace. The generic term sandboxing is used to cover the entire spectrum: each tool in this chapter combines software and hardware virtualization of technologies and uses Linux’s Kernel Virtual Machine (KVM), which is widely used to power VMs in public cloud services, including Amazon Web Services and Google Cloud.

You run a lot of workloads at BCTL, and you should remember that while these techniques may also protect against Kubernetes mistakes, all of your web-facing software and infrastructure is a more obvious place to defend first. Zero-days and container breakouts are rare in comparison to simple security-sensitive misconfigurations.

Hardened runtimes are newer, and have fewer generally less dangerous CVEs than the kernel or more established container runtimes, so we’ll focus less on historical breakouts and more on the history of micro VM design and rationale.

Defaults

kubeadm ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Learn Kubernetes Security

Learn Kubernetes Security

Kaizhe Huang, Pranjal Jumde
Networking and Kubernetes

Networking and Kubernetes

James Strong, Vallery Lancey
Hacking APIs

Hacking APIs

Corey Ball
Kubernetes Operators

Kubernetes Operators

Jason Dobies, Joshua Wood

Publisher Resources

ISBN: 9781492081722Supplemental ContentErrata Page