From containers to clusters: holistic security

Kubernetes penetration test

Kubernetes penetration test

The containerisation of applications or even entire infrastructures is picking up speed and simplifying the management of complex use cases.

Although the complexity of administration is reduced, security gaps can creep into the container setup due to ignorance, lack of experience or incorrect use, enabling attackers to compromise entire clusters or obtain sensitive data.

In a Kubernetes penetration test, we check the individual containers, the cluster and the interaction as a whole for security vulnerabilities.

K8s - The original

K8s is short for Kubernetes. Kubernetes is an open source platform for managing container-based applications that is frequently used in the cloud. It was originally developed by Google and is now one of the most frequently used tools for deploying and managing applications in the cloud.

Kubernetes makes it possible to package applications in containers that can then be executed on different hosts. The containers are managed by Kubernetes to ensure that they are executed when they are needed and are provided with the required resources. Kubernetes also offers functions for scaling applications, deploying application updates and managing application dependencies.

A key benefit of Kubernetes is its ability to run and manage applications on multiple hosts, making it an attractive option for organisations looking to deploy their applications in the cloud. It is also a good choice for organisations that choose to use container technologies, as it simplifies the management of containers.

K3s - The lightweight

K3s is a lightweight implementation of Kubernetes designed specifically for use in resource-constrained environments such as edge computing scenarios or on smaller servers. It was developed by Rancher Labs and offers many of the same features as Kubernetes, but with a reduced feature set and fewer dependencies, making it a faster and simpler alternative.

K3s is particularly useful for organisations looking to deploy Kubernetes in resource-constrained environments, such as edge computing infrastructure or smaller servers. It is also a good choice for organisations that choose to use container technologies, as it provides an easy way to manage and orchestrate containers. K3s is also easy to install and use, making it attractive for newcomers to the container world.

Black Box - Little to no information

No additional information is available for the penetration test of the cluster or individual containers.

Grey Box - Additional initial information

Access to different users who have different levels of authorisation. This allows us to check more quickly whether endpoints can be accessed by low-privileged users that should be reserved for higher-privileged users.

White Box - Comprehensive information and access to the cluster

The most effective approach: We have access to different users with different rights, as well as to parts of the source code and the logs. This allows us to gain a comprehensive picture of the application's security.