Back to all scenarios
Scenario #222
Security
K8s v1.22, Google Cloud
Using HTTP Instead of HTTPS for Ingress Resources
Sensitive applications were exposed using HTTP instead of HTTPS, leaving communication vulnerable to eavesdropping and man-in-the-middle attacks.
Find this helpful?
What Happened
Sensitive application traffic was served over HTTP rather than HTTPS, allowing attackers to potentially intercept or manipulate traffic.
Diagnosis Steps
- 1Inspected ingress resource configurations and confirmed that TLS termination was not configured.
- 2Verified that sensitive endpoints were exposed over HTTP without encryption.
Root Cause
Lack of TLS encryption in the ingress resources exposed sensitive traffic to security risks.
Fix/Workaround
• Configured ingress controllers to use HTTPS by setting up TLS termination with valid SSL certificates.
• Redirected all HTTP traffic to HTTPS to ensure encrypted communication.
Lessons Learned
Always use HTTPS for secure communication between clients and Kubernetes applications, especially for sensitive data.
How to Avoid
- 1Configure TLS termination for all ingress resources to encrypt traffic.
- 2Regularly audit ingress resources to ensure that sensitive applications are protected by HTTPS.