Tag

Cluster Hardening

0 views collected around this technical thread.

Efficient Ops
Efficient Ops
Feb 1, 2023 · Information Security

How a Misconfigured Kubelet Led to a Crypto‑Mining Breach and How to Secure Your Cluster

The article recounts a Kubernetes cluster intrusion where a misconfigured kubelet allowed crypto‑mining, details the forensic steps taken—including empty iptables, kubelet API exposure, and commented‑out settings—and offers concrete hardening recommendations to prevent similar attacks.

Cluster HardeningKubernetescrypto mining
0 likes · 5 min read
How a Misconfigured Kubelet Led to a Crypto‑Mining Breach and How to Secure Your Cluster
DevOps
DevOps
Mar 25, 2022 · Information Security

12 Best Practices for Securing Kubernetes (K8s) Environments

This article outlines twelve essential best‑practice steps—including updating to the latest stable release, enforcing PodSecurityPolicy, using namespaces, applying network policies, and hardening API server, scheduler, controller‑manager, etcd, and kubelet settings—to comprehensively secure a Kubernetes cluster.

Best PracticesCluster HardeningDevOps
0 likes · 11 min read
12 Best Practices for Securing Kubernetes (K8s) Environments
Efficient Ops
Efficient Ops
Sep 12, 2021 · Information Security

How a Misconfigured Kubelet Led to a Crypto‑Mining Breach—and How to Prevent It

A Kubernetes node was compromised for Monero mining due to empty iptables, exposed kubelet API, and a commented‑out security flag, prompting a detailed forensic analysis and a set of hardening steps to secure the cluster against similar attacks.

Cluster HardeningKubernetescrypto mining
0 likes · 5 min read
How a Misconfigured Kubelet Led to a Crypto‑Mining Breach—and How to Prevent It