Kahibaro
Discord Login Register

13.1 Security model overview

Core Principles of OpenShift Security

OpenShift’s security model is layered and opinionated: it builds on Kubernetes security, then adds defaults, constraints, and tooling to make multi-tenant clusters safer by default. At a high level, it focuses on:

Subsequent chapters (RBAC, SCC, image security, network security, compliance) drill into specific mechanisms; here the focus is on how they fit together conceptually.

Security Layers in OpenShift

OpenShift security can be viewed as a stack of layers, from “who can call the API” down to “what a process in a container can do on the host”:

  1. User and identity layer
  2. API access control layer (RBAC)
  3. Workload isolation and pod-level security (SCCs and pod configuration)
  4. Network segmentation and traffic control
  5. Image and supply-chain security
  6. Cluster and node security
  7. Monitoring, audit, and compliance

Each layer is relatively independent: a misconfiguration in one layer does not automatically bypass the others.

1. User and Identity Layer

This layer answers “who are you?”:

Key ideas:

2. API Access Control Layer

The API server is the main control point in OpenShift. All actions—creating pods, changing routes, reading secrets—go through the API.

The security model here is:

Conceptually:

This model enables:

3. Workload Isolation and Pod-Level Security

Once a request to run a workload is allowed, OpenShift enforces how that workload runs via pod-level security controls.

The central concepts are:

Key enforcement points include:

In practice, this layer creates runtime boundaries between workloads, even when they share nodes, and enforces least privilege at the pod level.

4. Network Segmentation and Traffic Control

OpenShift assumes that not all workloads should be able to talk to each other freely. Its security model includes:

From a model perspective:

5. Image and Supply-Chain Security

OpenShift treats container images as software artifacts that must be trusted before running, integrating mechanisms to:

Conceptually:

This ties cluster runtime security back to DevOps practices and the software supply chain.

6. Cluster and Node Security

Beneath Kubernetes and OpenShift abstractions, the cluster runs on operating system nodes.

The OpenShift security model assumes:

Important ideas:

7. Monitoring, Audit, and Compliance

Security is not only about prevention; it’s also about detection, investigation, and proof of control.

OpenShift’s model includes:

Conceptually:

Multi-Tenancy and Isolation Model

Multi-tenancy is a core design goal of OpenShift. The security model achieves tenant separation by combining several mechanisms:

In this model:

Security Responsibilities and Shared Model

OpenShift fits into a broader shared responsibility model:

This separation is reflected in the security model:

Putting It All Together: Typical Flow

A simplified end-to-end flow illustrates how the security model operates:

  1. A developer logs into OpenShift via the web console or oc:
    • Identity is verified through the configured authentication provider.
  2. The developer creates or modifies resources in a project:
    • The API server checks RBAC rules to determine if the action is allowed.
  3. A new application deployment is created:
    • The pod spec is validated against security policies (pod security constraints).
    • If it violates required policies (e.g., tries to run privileged), the request is rejected.
  4. The scheduler places the pod on a node:
    • Node and cluster-level security configurations determine isolation from other workloads.
  5. The pod starts, pulling an image:
    • Image policies and registries govern which images are permitted.
    • Scanning or signing policies might block or warn about risky images.
  6. The application begins communicating:
    • Network policies determine which pods/services it can reach.
    • External access is governed by routes/ingress and potentially external firewalls.
  7. All API calls and key events are logged:
    • Audit logs and metrics feed into monitoring and compliance systems.

At each step, a different part of the security model has a chance to enforce policy or provide visibility, ensuring that no single control is the only line of defense.

Key Takeaways

Subsequent chapters break down each of these layers—RBAC, SCCs, image security, network security, and compliance—into concrete mechanisms and practices.

Views: 53

Comments

Please login to add a comment.

Don't have an account? Register now!