ISSN : 2583-2646

Advanced Security Mechanisms in Kubernetes: Isolation and Access Control Strategies

ESP Journal of Engineering & Technology Advancements
© 2021 by ESP JETA
Volume 1  Issue 2
Year of Publication : 2021
Authors : Anirudh Mustyala, Sumanth Tatineni
: 10.56472/25832646/ESP-V1I2P109

Citation:

Anirudh Mustyala, Sumanth Tatineni, 2021. "Advanced Security Mechanisms in Kubernetes: Isolation and Access Control Strategies" ESP Journal of Engineering & Technology Advancements  1(2): 57-68.

Abstract:

Kubernetes has emerged as a powerful platform for orchestrating containerized applications, but with its growing adoption, security concerns have become increasingly paramount. This paper explores advanced security mechanisms within Kubernetes, focusing on isolation and access control strategies designed to enhance the security posture of Kubernetes environments. Isolation techniques such as namespaces, network policies, and node isolation are critical in preventing unauthorized access and minimizing the attack surface. Sandboxing, through technologies like gVisor and Kata Containers, adds an additional layer of security by providing lightweight, isolated environments for container execution. These sandboxing tools effectively mitigate risks associated with container escapes and privilege escalation attacks. Access control mechanisms, including Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) are essential for managing permissions and ensuring that only authorized entities can perform specific actions within the cluster. By defining granular policies, administrators can enforce the principle of least privilege, significantly reducing the risk of insider threats and inadvertent misconfigurations. The paper also delves into network security strategies such as implementing service meshes with tools like Istio, which offer fine-grained control over inter-service communication and provide capabilities like mutual TLS (mTLS) for encrypting traffic. Additionally, Kubernetes' native secrets management and integration with external secret stores enhance the security of sensitive information within the cluster. By combining these advanced security features, Kubernetes can be fortified against a wide array of threats, ensuring robust and resilient application deployments. This paper provides a comprehensive overview of these mechanisms, offering practical insights and best practices for leveraging them to achieve a secure Kubernetes environment.

References:

[1] Panagiotis, M. (2020). Attack methods and defenses on Kubernetes (Doctoral dissertation, University of Piraeus (Greece)).
[2] Huang, K., & Jumde, P. (2020). Learn Kubernetes Security: Securely orchestrate, scale, and manage your microservices in Kubernetes deployments. Packt Publishing Ltd.
[3] Suomalainen, J. (2019). Defense-in-Depth Methods in Microservices Access Control (Master's thesis).
[4] Chandramouli, R. (2019). Microservices-based application systems. NIST Special Publication, 800(204), 800-204.
[5] Shmeleva, E. (2020). How Microservices are Changing the Security Landscape (Master's thesis).
[6] Preuveneers, D., & Joosen, W. (2019, June). Towards multi-party policy-based access control in federations of cloud and edge microservices. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 29-38). IEEE.
[7] Yarygina, T. (2018). Exploring microservice security.
[8] Márquez, G., & Astudillo, H. (2019, September). Identifying availability tactics to support security architectural design of microservice-based systems. In Proceedings of the 13th European Conference on Software Architecture-Volume 2 (pp. 123-129).
[9] Smith, T. (2017). How do you secure microservices. URL https://dzone. com/articles/how-do-you-secure-microservices.
[10] Indrasiri, K., Siriwardena, P., Indrasiri, K., & Siriwardena, P. (2018). Microservices security fundamentals. Microservices for the Enterprise: Designing, Developing, and Deploying, 313-345.
[11] Chandramouli, R., & Butcher, Z. (2020). Building secure microservices-based applications using service-mesh architecture. NIST Special Publication, 800, 204A.
[12] Fetzer, C. (2016). Building critical applications using microservices. IEEE Security & Privacy, 14(6), 86-89.
[13] Li, X., Chen, Y., & Lin, Z. (2019, August). Towards automated inter-service authorization for microservice applications. In Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos (pp. 3-5).
[14] Barabanov, A., & Makrushin, D. (2020). Authentication and authorization in microservice-based systems: survey of architecture patterns. arXiv preprint arXiv:2009.02114.
[15] Chawla, H., Kathuria, H., Chawla, H., & Kathuria, H. (2019). Securing microservices. Building Microservices Applications on Microsoft Azure: Designing, Developing, Deploying, and Monitoring, 193-223.

Keywords:

Kubernetes, Security Mechanism, Access Control Strategies.