Professional Documents
Culture Documents
Kubecon DTC 2016
Kubecon DTC 2016
Kubecon DTC 2016
Kubernetes
Matthew Garrett
@mjg59 | mjg59@coreos.com | coreos.com
Secure runtimes require a secure base
How do we trust a system?
Trusted Computing
Trusted Platform Module
Unique per-system identity
Cryptographically verifiable system state
“Attestation”
How does this fit into Kubernetes?
Verify system state before providing access
Two-pronged approach
Authentication Controller
Initial authentication is TPM based
Attestation is slow :(
On valid auth, provide secrets
Admission Controller
Validate state on node operations
Can we go further?
Measure initial container state
Cryptographically verifiable audit trail
Proof of concept implementation
JSON-based policy description
Should this be in-tree?
https://github.com/mjg59/kubernetes
Matthew Garrett
@mjg59 | mjg59@coreos.com | coreos.com
Thank you!
We’re hiring in all departments!
Email: careers@coreos.com Positions: coreos.com/careers