Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Suggest enabling metadata-concealment by default #139

Closed
bgeesaman opened this issue Apr 17, 2019 · 2 comments · Fixed by #248
Closed

Suggest enabling metadata-concealment by default #139

bgeesaman opened this issue Apr 17, 2019 · 2 comments · Fixed by #248
Labels
enhancement New feature or request

Comments

@bgeesaman
Copy link

Strongly suggest that the metadata-concealment proxy be enabled to protect cluster privilege escalation attacks (without this control in place, any pod has the ability to use the instance metadata API to obtain the kubelet's credentials which provides a path to gain access to all cluster secrets).

https://www.terraform.io/docs/providers/google/r/container_cluster.html#node_metadata
e.g.

workload_metadata_config {
  node_metadata = "SECURE"
}

See: https://cloud.google.com/kubernetes-engine/docs/how-to/protecting-cluster-metadata#concealment https://www.4armed.com/blog/kubeletmein-kubelet-hacking-tool/ and https://www.qwiklabs.com/focuses/5158?parent=catalog for more background info on why this control is so important.

@morgante
Copy link
Contributor

We should expose this as a variable (with a SECURE default).

@aaron-lane aaron-lane added the enhancement New feature or request label May 27, 2019
@morgante
Copy link
Contributor

We have exposed this (as node_metadata) but should make the default SECURE.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants