logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: Andres Aguiar, Anders Eknert
2023-04-21

tldr - powered by Generative AI

The presentation discusses the use of service policies and Argo workflows for Cloud native open source authorization application architecture.
  • The use of service policies and Argo workflows enables Cloud native open source authorization application architecture.
  • Service policies allow for dynamic resolution of authorization checks based on service instances.
  • Argo workflows are used for end-to-end workflows for compiling, testing, and validating authorization changes.
  • The presentation provides an example of using Argo to submit a job to pull down policies and run tests to validate changes.
  • The presentation emphasizes the importance of testing and evolving policies over time.
Authors: Mike Danese, Rita Zhang, David Eads, Jordan Liggitt
2023-04-21

SIG Auth is responsible for Kubernetes features that control and protect access to the API and other core components. This includes authentication, authorization, auditing, and some security policy. In this talk, we'll deep dive into projects SIG Auth is currently working on, answer your questions about the SIG and this area of Kubernetes, and share ways you can get involved.
Authors: Christophe Tafani-Dereeper, Diego Comas
2023-04-20

tldr - powered by Generative AI

The talk discusses common pitfalls and traps in managed Kubernetes environments and how to bridge the gaps between what runs inside a managed Kubernetes cluster and what is deployed in other services of the cloud provider.
  • Admins in AWS do not necessarily have permissions on their Kubernetes cluster
  • External secrets can be brought into the cluster using different techniques
  • Architecting cloud-native applications can benefit from the full power of cloud services while avoiding complete vendor lock-in
  • Attackers can abuse mechanisms to pivot from exploiting a single containerized workload to compromising full cloud environments
  • A tool is being released to help mitigate and handle some of the pitfalls and problems
Authors: Asaf Cohen
2022-10-25

tldr - powered by Generative AI

The presentation discusses best practices for managing policy in DevOps and cybersecurity, including decoupling policy from code, using GitOps for policy, and planning ahead for future demands.
  • Decoupling policy from code is important for flexibility and scalability
  • GitOps for policy allows for auditable and testable policy management
  • Planning ahead for future demands ensures that the system can grow without needing to be rewritten from scratch
Conference:  CloudOpen 2022
Authors: Tim Hinrichs
2022-06-23

tldr - powered by Generative AI

Introduction to Open Policy Agent (OPA) and its flexibility in policy language and deployment options
  • OPA is a decision point for authorization decisions made by any service
  • Policy queries can be any arbitrary JSON value and the policy language is purpose-built to handle deeply nested JSON data
  • Context-aware policies can be created by injecting arbitrary data into OPA
  • Policy decisions can also be arbitrary JSON objects
  • OPA is flexible in deployment options, including running as a CLI, embedded library, or centralized authorization service
  • The policy language is expressive but not as complex as a programming language
Authors: Mike Danese, Margo Crawford
2022-05-19

tldr - powered by Generative AI

The presentation discusses authentication and authorization in the context of a test server, covering how to indicate a path that requires authentication, setting up credentials at different levels of specificity, and the hierarchy of authentication attempts.
  • Authentication can be indicated on a path by locking a padlock icon
  • Credentials can be set at different levels of specificity, including the global organizational level, the warehouse server level, the client level, and the path level
  • The program will attempt to authenticate using the most specific credentials first, following a hierarchy from path to client to warehouse to global
  • An anecdote is provided where the presenter intentionally sets incorrect credentials at the path level to demonstrate the hierarchy of authentication attempts
Authors: Stefan Prodan
2022-05-18

tldr - powered by Generative AI

Flux is a secure and flexible continuous delivery tool for Kubernetes that can be easily integrated into various platforms.
  • Flux has focused on security hardening and undergone internal audits to address vulnerabilities in its multi-tenancy model and improve secrets management and decryption.
  • Flux can be easily kept up to date through its self-upgrading feature and integration with renovatebot.
  • Flux works with open PGP to restrict access to sensitive data and prevent unauthorized modifications.
  • Flux execution is predictable and can be extended through building new Kubernetes controllers using the GitHub toolkit.
  • Flux has been adopted by various platforms and organizations, including the U.S. Department of Defense and Deutsche Telekom.
  • Flux has a security RFC process in place to ensure that any changes that affect its security posture undergo thorough review and approval.
Authors: James Barclay, Roman Porter
2021-10-15

tldr - powered by Generative AI

Improving security and scalability in authentication and authorization for services
  • Providing libraries and side cars for authentication and authorization is not scalable and difficult to maintain
  • Enforcement of authentication and authorization needs to be mandatory
  • JWT tokens become too large as permissions increase
  • Policies for user access are buried deep within applications, making auditing difficult
  • Lack of control over code that validates tokens limits ability to improve authentication and authorization
Authors: Cagri Cetin, Quentin Long
2021-10-14

Yelp recently migrated their container-orchestration system from Mesos to Kubernetes. However, existing Kubernetes authorization mechanisms were insufficient to implement least-privilege access control rules. Yelp needed to authorize its users to hundreds of services owned by hundreds of different teams. By leveraging the Open Policy Agent (OPA), Yelp has implemented an authorization system that allows defining fine-grained authorization rules: These can rely on service ownerships, resources’ or actions’ sensitivity levels. This talk covers Yelp’s journey to a fine-grained Kubernetes authorization using OPA and LDAP. It will discuss: - Shortcomings of existing Kubernetes authorization mechanisms - Design details of the new OPA-based system - Strategies for provisioning authorization rules at scale - Migration to the new system with zero downtime - Issues encountered along the way and lessons learned