Secure Transport¶
Secure transport is a critical security principle in the Secure CINC Auditor Kubernetes Container Scanning solution. This principle ensures that all communications between components are encrypted and protected against eavesdropping and tampering.
Implementation Details¶
The secure transport principle is implemented through:
- All API communication uses TLS
- Kubeconfig files include the cluster's certificate authority data
- No insecure TLS options are enabled
TLS Communication¶
All communication with the Kubernetes API server is secured through TLS:
- Certificate Validation: The Kubernetes API server's certificate is validated against trusted certificate authorities
- Encryption in Transit: All data exchanged with the API server is encrypted
- No Insecure Fallback: The solution does not permit insecure connections if TLS fails
- Modern TLS Versions: Only secure TLS versions (TLS 1.2+) are used
Kubeconfig Security¶
Kubeconfig files are configured securely:
Key security features:
- Certificate authority data is embedded (no insecure
insecure-skip-tls-verify: true
) - TLS verification is always enabled
- Ephemeral tokens are used for authentication
Network Security Considerations¶
Beyond TLS, additional network security measures include:
- Network Policies: Optional Kubernetes NetworkPolicy resources to restrict pod communication
- Internal Service Communication: Using internal Kubernetes service names to avoid external network traversal
- API Server Access Control: Leveraging Kubernetes API server authentication and authorization
Security Benefits¶
Secure transport provides several security benefits:
- Confidentiality: Prevents eavesdropping on sensitive scanning data
- Integrity: Ensures data cannot be tampered with during transmission
- Authentication: Verifies the identity of the Kubernetes API server
- Man-in-the-Middle Protection: Prevents interception attacks
- Regulatory Compliance: Supports requirements for encrypted communications
Implementation Across Scanning Approaches¶
All scanning approaches use the same secure transport mechanisms to communicate with the Kubernetes API server:
Scanning Approach | Secure Transport Implementation |
---|---|
Kubernetes API | TLS-secured API server communication |
Debug Container | TLS-secured API server communication |
Sidecar Container | TLS-secured API server communication |
Best Practices¶
- Certificate Rotation: Ensure cluster certificates are rotated according to security policies
- TLS Version: Configure minimum TLS version to 1.2 or higher
- Cipher Suites: Use only strong cipher suites
- Kubeconfig Security: Protect kubeconfig files with appropriate file permissions
- Network Segmentation: Consider network segmentation for scanner components
Related Documentation¶
- Risk Analysis - Security risks mitigated by secure transport
- Compliance Documentation - Compliance requirements for transport security
- Kubernetes Setup - Kubeconfig configuration
- Tokens - Token generation and security