Cloud Native New York City

Securing Debugging Workflows in Cloud-Native Environments

Capacity:
virtual
Event date
Feb 25, 26
06:00 PM - 07:30 PM EST
Location
Virtual event
About this event

Debugging containerized workloads often requires elevated privileges, creating a critical security gap. Common practices such as using kubectl exec to open shells inside pods or deploying privileged debug containers allow engineers to run commands directly on cluster nodes. While convenient, these methods bypass granular access controls and lack robust audit trails, introducing risks of privilege escalation, lateral movement, and compliance violations.

This session shares how our engineering team enhanced operational security by applying zero-trust principles to cluster debugging. We will cover three key components:

  1. Certificate-Based Authentication: Enforcing strong identity verification for ephemeral access using hardware-backed tokens such as YubiKey.
  2. Granular Role Assignments: Using RBAC (Role-Based Access Control) policies to restrict privileges and isolate troubleshooting tasks.
  3. Secure Diagnostic Sessions: Establishing ephemeral SSH channels for high-privilege operations with full command-level auditing and metadata logging.

Attendees will gain a clear understanding of how these controls reduce attack surfaces without sacrificing agility. Real-world examples of debugging-related breaches will illustrate why operational security must extend beyond deployment hardening. The session concludes with actionable steps to integrate these techniques into existing workflows and build a stronger security culture across engineering teams.

Speakers
Organizers