Fork me on GitHub

Build and Deployment -> Deployment: Usage of trusted images

Risk and Opportunity

Risk: Developers or operations might start random images in the production cluster which have malicous code or known vulnerabilities.

Exploit details

Usefullness: Medium
Required knowledge: Very Low (one discipline)
Required time: Very Low
Required resources (systems): Very Low

Additional Information

Implementation hints: Kubernetes Admission Controller can whitelist registries and/or whitelist a signing key.
OWASP SAMM 2 Mapping: i-secure-deployment|A|2