Kubernetes command logging on Google Cloud Platform for PCI Compliance

7/21/2016

Using Kubernetes' kubectl I can execute arbitrary commands on any pod such as kubectl exec pod-id-here -c container-id -- malicious_command --steal=creditcards

Should that ever happen, I would need to be able to pull up a log saying who executed the command and what command they executed. This includes if they decided to run something else by simply running /bin/bash and then stealing data through the tty.

How would I see which authenticated user executed the command as well as the command they executed?

-- nathanjosiah
google-cloud-platform
google-kubernetes-engine
kubernetes
pci-compliance
pci-dss

2 Answers

1/5/2017

There are 3rd party solutions that can solve the auditing issue, and if you're looking for a PCI compliance as the title implies solutions exist that helps solve the broader problem, and not just auditing.

Here is a link to such a solution by Twistlock. https://info.twistlock.com/guide-to-pci-compliance-for-containers Disclaimer, I work for Twistlock.

-- Ben
Source: StackOverflow

7/22/2016

Audit logging is not currently offered, but the Kubernetes community is working to get it available in the 1.4 release, which should come around the end of September.

-- Alex Robinson
Source: StackOverflow