Estudio e implantación de medidas de seguridad para clústeres de Kubernetes.
Fecha
2021-10-18
Autores
Título de la revista
ISSN de la revista
Título del volumen
Editor
Jaén: Universidad de Jaén
Resumen
Hoy en día, las funciones realizadas por las aplicaciones de software son más complejas. Aspectos como su
tamaño y su disponibilidad, han provocado que las plataformas de computación en la nube constituyan la
infraestructura más popular para su alojamiento. Las aplicaciones nativas en la nube se basan usualmente en
contenedores, y en entornos de grandes aplicaciones, es necesaria una plataforma para la orquestación eficiente
de estos contenedores. Kubernetes representa la solución de facto empleada hoy en día para estos propósitos.
En este trabajo se sistematiza el conocimiento en la literatura sobre las buenas prácticas de seguridad. Además,
se diseñó una metodología de validación del nivel de seguridad de un cluster. Dicho protocolo consta de cinco
fases que fueron aplicadas en varios escenarios de ataque cuidadosamente diseñados para validar nuestra
propuesta. Como resultado, se constató la eficacia de las medidas propuestas para mejorar la seguridad en
Kubernetes.
Nowadays, the functionalities performed by software applications are more complex. Aspects such as application size and availability have made cloud computing platforms the most popular infrastructure for hosting such applications. Cloud-native applications are usually container-based, and in large application environments, a platform is needed for the efficient orchestration of these containers. Kubernetes represents the standard used today for these purposes. In this work, the information in the literature regarding good security practices is systematized. In addition, a cluster security validation methodology was also designed. This protocol consists of five phases that were applied in several attack scenarios carefully designed to validate our proposal. As a result, the effectiveness of the measures proposed to improve the security in a Kubernetes cluster was verified.
Nowadays, the functionalities performed by software applications are more complex. Aspects such as application size and availability have made cloud computing platforms the most popular infrastructure for hosting such applications. Cloud-native applications are usually container-based, and in large application environments, a platform is needed for the efficient orchestration of these containers. Kubernetes represents the standard used today for these purposes. In this work, the information in the literature regarding good security practices is systematized. In addition, a cluster security validation methodology was also designed. This protocol consists of five phases that were applied in several attack scenarios carefully designed to validate our proposal. As a result, the effectiveness of the measures proposed to improve the security in a Kubernetes cluster was verified.
Descripción
Palabras clave
Seguridad Informática