# Security Typhoon aims to be minimal and secure. We're running it ourselves after all. ## Overview **Kubernetes** * etcd with peer-to-peer and client-auth TLS * Kubelets TLS bootstrap certificates (72 hours) * Generated TLS certificate (365 days) for admin `kubeconfig` * [NodeRestriction](https://kubernetes.io/docs/reference/access-authn-authz/node/) is enabled to limit Kubelet authorization * [Role-Based Access Control](https://kubernetes.io/docs/admin/authorization/rbac/) is enabled. Apps must define RBAC policies for API access * Workloads run on worker nodes only, unless they tolerate the master taint * Kubernetes [Network Policy](https://kubernetes.io/docs/concepts/services-networking/network-policies/) and Calico [NetworkPolicy](https://docs.projectcalico.org/latest/reference/calicoctl/resources/networkpolicy) support [^1] [^1]: Requires `networking = "calico"`. Calico is the default on all platforms (AWS, Azure, bare-metal, DigitalOcean, and Google Cloud). **Hosts** * Container Linux auto-updates are enabled * Hosts limit logins to SSH key-based auth (user "core") * SELinux enforcing mode [^2] [^2]: SELinux is enforcing on Fedora CoreOS, permissive on Flatcar Linux. **Platform** * Cloud firewalls limit access to ssh, kube-apiserver, and ingress * No cluster credentials are stored in Matchbox (used for bare-metal) * No cluster credentials are stored in Digital Ocean metadata * Cluster credentials are stored in AWS metadata (for ASGs) * Cluster credentials are stored in Azure metadata (for scale sets) * Cluster credentials are stored in Google Cloud metadata (for managed instance groups) * No account credentials are available to Digital Ocean droplets * No account credentials are available to AWS EC2 instances (no IAM permissions) * No account credentials are available to Azure instances (no IAM permissions) * No account credentials are available to Google Cloud instances (no IAM permissions) ## Precautions Typhoon limits exposure to many security threats, but it is not a silver bullet. As usual, * Do not run untrusted images or accept manifests from strangers * Do not give untrusted users a shell behind your firewall * Define network policies for your namespaces ## Container Images Typhoon uses upstream container images (where possible) and upstream binaries. !!! note Kubernetes releases `kubelet` as a binary for distros to package, either as a DEB/RPM on traditional distros or as a container image for container-optimized operating systems. Typhoon [packages](https://github.com/poseidon/kubelet) the upstream Kubelet and its dependencies as a [container image](https://quay.io/repository/poseidon/kubelet) for use in Typhoon. The upstream Kubelet binary is checksummed and packaged directly. Quay automated builds provide verifiability and confidence in image contents. ## Disclosures If you find security issues, please email dghubble at gmail. If the issue lies in upstream Kubernetes, please inform upstream Kubernetes as well.