Skip to content

Gate images deployed to Kubernetes cluster

Info

ID: MS-M9005.003
Sub-mitigation of: MS-M9005 MITRE mitigation: M1016, M1045

Gate deployment of images to Kubernetes cluster to prevent deploying images that does not meet the content trust requirements. This can include limiting images to be deployed only from trusted registries, to have digital signature or pass vulnerability scanning and other checks. This can prevent potential adversaries from using their own malicious images in the cluster. Also, this ensures that only images that passed the security compliance policies of the organization are deployed in the cluster. Kubernetes admission controller mechanism is one of the commonly used tools for implementing such policy.

Techniques Addressed by Mitigation

ID Name Use
MS-TA9002 Compromised image in registry Ensure that only images that passed the security compliance policies are pushed to registries and deployed to Kubernetes clusters.
MS-TA9004 Application vulnerability Scan images for vulnerabilities
MS-TA9008 New container Restrict deployment of new containers from trusted supply chain
MS-TA9009 Application exploit (RCE) Block vulnerable images
MS-TA9011 Sidecar injection Restrict deployment of new containers from trusted supply chain
MS-TA9012 Backdoor container Restrict deployment of new containers from trusted supply chain
MS-TA9014 Kubernetes CronJob Restrict deployment of new containers from trusted supply chain
MS-TA9018 Privileged container Restrict deployment of new containers from trusted supply chain
MS-TA9023 Pod or container name similarity Restrict deployment of new containers from trusted supply chain