Welcome to the KubeSquire Zero Trust Implementation repository. This project demonstrates how to deploy the Google Microservices Demo ("Online Boutique") using a "Security by Design" approach, adhering to CNCF Secure Defaults.
This README serves as your map to the documentation, explaining what to read, when to read it, and how the repository is structured.
Target Audience: Engineers who want to build the environment now.
Goal: Go from zero to a fully secured cluster in one working day.
- Start Here: 8-Hour Zero Trust Sprint
This is the primary execution guide. It condenses all the theory into actionable PowerShell/CLI steps. It covers:- Setting up the "Greenfield" environment.
- Deploying via ArgoCD (GitOps).
- Enforcing mTLS (Istio), Network Policies (Cilium), and Policy-as-Code (Kyverno).
Target Audience: Engineers debugging issues or seeking to understand the why behind specific configurations.
Goal: Step-by-step explanations of each security layer.
If you get stuck during the Sprint, or want to implement just one component (like Secrets Management) in your own cluster, refer to these modules:
- Phase 0: Prerequisites & Setup
- Read when: You are setting up your Windows/WSL environment for the first time. Lists required tools (Helm, Kustomize, etc.).
- Phase 1: Secure Supply Chain
- Read when: You want to understand how we template the application and validate manifests before deployment.
- Phase 2: Identity & Segmentation
- Read when: You need to configure Istio mTLS or AuthorizationPolicies.
- Phase 3: GitOps Automation
- Read when: You are setting up ArgoCD or troubleshooting sync issues.
- Phase 4: Secrets Management
- Read when: You need to integrate External Secrets Operator (ESO) with a vault.
- Phase 5: Stateful Zero Trust
- Read when: You are dealing with persistent data and database security.
- Phase 6: Network Segmentation
- Read when: You are configuring Cilium Network Policies or Egress filtering.
- Phase 7: Deep Observability
- Read when: You need to set up Hubble, Prometheus, or Grafana for visibility.
- Phase 8: Infrastructure Hardening
- Read when: You are auditing the cluster nodes or API server configuration.
- Phase 9: Operator Security
- Read when: You are writing or securing Kubernetes Operators.
Target Audience: Architects, Security Leads, and Decision Makers.
Goal: Understand the design philosophy, compliance alignment, and industry standards.
- Zero Trust Enforcement in Kubernetes Security
- Read when: You need the high-level proposal, executive summary, or mapping to CNCF standards. This explains the "Greenfield" vs. "Brownfield" philosophy.
- Data on Kubernetes (DoK) Whitepaper
- Read when: Designing stateful workloads on K8s.
- Operator Whitepaper
- Read when: Understanding the security implications of the Operator pattern.
apps/: Contains the application source code and Kustomize bases.apps/online-boutique/base: The upstream manifests.apps/online-boutique/overlays: The environment-specific configurations (Production, Dev).
infrastructure/: Contains the manifests for the security platform itself.kyverno-install.yaml,falco-exception.yaml,argocd-install.yaml, etc.
walkthroughs/: The detailed documentation modules listed above.
- Falco Pods Pending?
See the Sprint Guide (Hour 8) for the CPU request patch. - Kyverno Blocking Deployments?
Ensure you have applied theexceptionNamespacepatch described in Hour 7.