AKS | CNCF Quebec Meetup

Hi,

I am thrilled to share that I had the opportunity to speak at the CNCF Québec meetup this week. My presentation focused on the various security vectors that a malicious actor may exploit to target an Azure Kubernetes Cluster deployment.

Throughout my talk, I highlighted several critical topics that I believe are crucial for understanding and preventing security breaches, including:

  • The exploitation of Azure Resource Graph for discovery purposes
  • The risks associated with malicious admission controllers
  • Network attacks and their implications
  • The importance of understanding the differences between AKS Service Principal and MSI
  • Insider attacks and their impact on security.
Chargeur En cours de chargement…
Logo EAD Cela prend trop de temps ?

Recharger Recharger le document
| Ouvert Ouvrir dans un nouvel onglet

Maxime.

AKS | Istio-based service mesh add-on

Hi!,

As cloud-native applications continue to become more complex, managing the communication between services in a microservices architecture becomes a challenge. Service mesh technology offers a solution to this challenge by providing a layer of abstraction for managing network traffic between services. One of the leading service mesh technologies is Istio, and it is now available as an add-on for Azure Kubernetes Service (AKS).

Istio is an open-source service mesh that provides a uniform way to connect, secure, and manage microservices. It provides features such as traffic management, service discovery, load balancing, and security. With Istio, you can manage the communication between services without modifying the application code or infrastructure. Istio is built on top of Envoy, a high-performance proxy that intercepts and routes network traffic between services.

AKS is a managed Kubernetes service that simplifies the deployment, management, and scaling of containerized applications. AKS provides a secure, reliable, and scalable platform for running microservices. However, managing the communication between services can become complex as the number of services and the traffic between them grows. By adding Istio to AKS, you can simplify the management of microservices communication. Istio provides a set of tools and features that make it easier to manage traffic, secure communication, and monitor services. With Istio, you can:

  • Control traffic: Istio provides traffic management features such as load balancing, routing, and fault injection. You can configure Istio to control the traffic between services and ensure that the traffic is routed to the correct version of the service.
  • Secure communication: Istio provides security features such as authentication, authorization, and encryption. With Istio, you can secure the communication between services without modifying the application code.
  • Monitor services: Istio provides monitoring features such as tracing and metrics. With Istio, you can monitor the performance of services and troubleshoot issues.

To use Istio with AKS, you need to enable the Istio add-on when you create an AKS cluster. You can do this by using the Azure portal, Azure CLI, or Azure PowerShell. Once you have enabled the Istio add-on, Istio is deployed as a set of Kubernetes resources in your AKS cluster.

Deploy Istio addon for a new AKS cluster
az extension update --name aks-preview
az feature register --namespace "Microsoft.ContainerService" --name "AzureServiceMeshPreview"
az group create --name ${RESOURCE_GROUP} --location ${LOCATION}
az aks create \
--resource-group ${RESOURCE_GROUP} \
--name ${CLUSTER} \
--enable-asm
Deploy Istio addon for an existing AKS cluster
az extension update --name aks-preview
az feature register --namespace "Microsoft.ContainerService" --name "AzureServiceMeshPreview"
az aks mesh enable --resource-group ${RESOURCE_GROUP} --name ${CLUSTER}
az aks show --resource-group ${RESOURCE_GROUP} --name ${CLUSTER}  --query 'serviceMeshProfile.mode'

Istio-based service mesh add-on for AKS has the following limitations:

  • The add-on currently doesn’t work on AKS clusters using Azure CNI Powered by Cilium.
  • The add-on doesn’t work on AKS clusters that are using Open Service Mesh addon for AKS.
  • The add-on doesn’t work on AKS clusters that have Istio installed on them already outside the add-on installation.
  • Managed lifecycle of mesh on how Istio versions are installed and later made available for upgrades.
  • Istio doesn’t support Windows Server containers.
  • Customization of mesh based on the following custom resources is blocked for now – EnvoyFilter, ProxyConfig, WorkloadEntry, WorkloadGroup, Telemetry, IstioOperator, WasmPlugin

After Istio is deployed, you can configure it using Istio configuration resources such as VirtualService, DestinationRule, and Gateway. These resources allow you to control the traffic between services, apply security policies, and configure load balancing.

Istio-based service mesh add-on for Azure Kubernetes Service provides a powerful tool for managing microservices communication. With Istio, you can simplify the management of traffic, security, and monitoring in your AKS cluster. The Istio add-on for AKS is easy to use and provides a powerful set of features that can help you manage your microservices architecture with ease.

Reference: https://learn.microsoft.com/en-us/azure/aks/istio-about

Maxime.

Microsoft Defender for DevOps – Overview

Hi,

In today’s fast-paced software development landscape, security has become a top priority for DevOps teams. Security breaches can cause significant financial loss, damage to reputation, and loss of trust from customers. Microsoft Defender for DevOps is a comprehensive security solution designed to help DevOps teams build and deliver secure applications.

Microsoft Defender for DevOps is a cloud-based security solution that integrates with Azure DevOps and GitHub. It provides real-time security analysis of code, build artifacts, and deployment pipelines to detect potential security threats. Microsoft Defender for DevOps uses machine learning algorithms to analyze data and detect potential security vulnerabilities, providing a comprehensive defense against cyber attacks.

One of the key features of Microsoft Defender for DevOps is its ability to provide continuous security monitoring throughout the software development lifecycle. It can scan code repositories and identify potential security vulnerabilities in the codebase. It can also analyze build artifacts and identify potential security vulnerabilities that may have been introduced during the build process. By providing real-time security analysis, Microsoft Defender for DevOps helps DevOps teams identify and remediate potential security threats early in the development process, reducing the risk of security breaches.

Another key feature of Microsoft Defender for DevOps is its ability to provide compliance management. It can help DevOps teams to comply with industry standards such as HIPAA, PCI, and GDPR by providing continuous monitoring of security controls and generating compliance reports. Compliance reports can be generated for individual applications or across an entire organization, making it easy for DevOps teams to demonstrate compliance to auditors and regulators.

Microsoft Defender for DevOps also provides integration with other security tools, such as Microsoft Defender and Azure Sentinel. This integration provides a unified view of security across the organization, making it easier for DevOps teams to identify and remediate security threats.

In conclusion, Microsoft Defender for DevOps is a comprehensive security solution designed to help DevOps teams build and deliver secure applications. By providing continuous security monitoring throughout the software development lifecycle, compliance management, and integration with other security tools, Microsoft Defender for DevOps helps DevOps teams identify and remediate potential security threats early in the development process, reducing the risk of security breaches. By implementing Microsoft Defender for DevOps, organizations can take a proactive approach to cybersecurity and ensure that their applications are secure and compliant with industry standards.

Reference: https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-devops-introduction

Maxime.