https://www.youtube.com/watch?v=HIM0HwWLJ7g
The recording of my talk Security Considerations for Container Runtimes - Dan Walsh, Red Hat (@rhatdan)
Explain/demonstrates using Kubernetes with different security features for your container environment
General Concept
- Run containers without root, period
- Take advantage of all security features the host provides
Configuring CRI-O:
- Run containers with read-only images
- Limit the Linux capabilities running within your container
- Set up container storage to modify the storage options in a more secure manner
- Configure alternative OCI Runtimes: Kata, Gvisord and Nabla to run locked down containers
Building images with security in mind.
- Limit packages/attack surface of container images
- Build container images within a locked down kubernetes container
Advances in User Namespaces
- Demonstrate running each container with a different User Namespace
- Configure system to take advantage of user namespace container separation, without taking a drastic speed hit
And many more...
You might find Scott McCarty's article A Practical Introduction to Container Terminology helpful for a comparison of container runtimes.
Last updated: February 11, 2024