kravernetes

Kravernetes - Full Contact Kubernetes

Krav means contact in Hebrew. Full contact k8s is an approach to k8s that focuses on practical real-world skills via the application of Krav Maga self-defense principles.


History of Krav Maga

Krav Maga is a military self-defence and fighting system developed for the Israel Defense Forces (IDF) and Israeli security forces derived from a combination of techniques sourced from Boxing, Wrestling, Judo, Aikido, and Karate. Krav Maga is known for its focus on real-world situations and its extreme efficiency. It was derived from the street-fighting experience of Hungarian-Israeli martial artist Imi Lichtenfeld, who made use of his training as a boxer and wrestler, while defending the Jewish quarter against fascist groups in Bratislava, Czechoslovakia, during the mid-to-late 1930s. In the late 1940s, after his aliyah to Mandatory Palestine, he began to provide lessons on combat training to what was to become the IDF.

Krav Maga has a philosophy emphasizing aggression, and simultaneous defensive and offensive maneuvers.

Some of the key focus is instinctive response under stress. To that end, Krav Maga is an eclectic system that has not sought to replace existing effective techniques, taking what is useful from available systems, for example:

* Strikes – as per karate, and boxing,
* Take-downs and throws – per judo, aikido and wrestling
* Ground work – per judo and wrestling
* Escapes from chokes and holds – per judo, aikido, wrestling
* Empty-hand weapon defenses – per aikido

DevSecOps is an eccelctic system as well.

DevSecOps

@mcgonagle DevSecOps Definition - Shifting Security Left through a Technical and Cultural Focus on Teamwork and the Secure Delivery of Software Mission.

The purpose of DevSecOps is to integrate security controls and processes into the DevOps software development cycle, a process which is achieved by promoting the collaboration between security teams, development teams and operations teams.

Kraverenetes is a practical DevSecOps methodology which focuses on the four pillars of Krav Maga, which are:

1. awareness
2. avoidance
3. de-escalation and escape
4. last-resort decisive, simultaneous attack and defense

Attack and Defense - Kravernetes Tenents

1. Be aggressive but smart in your problem solving.
2. Be vigilant in identifing and addressing challenges.
3. Be proactive based on your current weaknesses or vulnerabilities; react quickly when you have to.
4. Be tool agnostic.
5. Invoke precision when executing tasks.
6. Employ simple and repeatable techniques.
7. Include situational awareness in all aspects of your practice.
8. Understand the impact of stress on your planning and response.

1. Be aggressive but smart in your problem solving

2. Be vigilant in identifying and addressing challenges

3. Be proactive based on your current weaknesses; react quickly when you have to

4. Be tool agnostic

5. Invoke precision when executing tasks

6. Employ simple and repeatable techniques

7. Include situational awareness in all aspects of your practice

8. Understand the impact of stress on your planning and response


Retzev - “Continuous Motion” in Kubernetes

Retzev in Kravernetes means maintaining continuous, flowing operations that seamlessly combine defensive security measures with offensive optimization techniques. Like in Krav Maga, you never stop moving - each action flows into the next.

Continuous Motion Examples:

Security Scanning → Remediation → Validation:

# Flow from discovery to action
kube-bench run → kubectl apply -f security-policy.yaml → kubesec scan deployment.yaml

Monitoring → Alerting → Auto-scaling → Optimization:

# Metrics trigger scaling which triggers optimization
kubectl top nodes → HPA triggers → kubectl scale → Resource optimization

Deploy → Test → Monitor → Rollback/Forward:

# Deployment flows immediately into verification
kubectl apply -f app.yaml && kubectl rollout status deployment/app && curl health-check || kubectl rollout undo deployment/app

Incident Response Chain:

# Immediate response flows through investigation to resolution
kubectl describe pod → kubectl logs → kubectl exec -it → kubectl patch/delete

GitOps Continuous Flow:

Git commit → CI/CD pipeline → Deployment → Health checks → Prometheus metrics → Alert → Auto-remediation → Git commit

The key is never stopping - each Kubernetes action should trigger the next logical step in an unbroken chain of defensive and offensive operations.


Situational Awareness = Kubernetes Mindfulness

Situation awareness in Kubernetes is the foundation for successful cluster operations and incident response. Like in combat situations, lacking awareness leads to critical failures, security breaches, and service outages.

Kubernetes Awareness Levels:

-6 Unaware: No monitoring, no alerts, deployments without resource limits

-5 Semi-Aware: Basic monitoring but no proactive alerting

-3 Aware: Regular monitoring with basic alerts

-2 Cautious: Proactive monitoring with comprehensive alerting

-1 Alert: Advanced observability with predictive capabilities

0 Prepared: Full spectrum awareness with automated response


Kubernetes THREAT Model

T - Technical Threats
H - Human Threats
R - Resource Threats
E - Environmental Threats
A - Application Threats
T - Trust Threats

Technical Threats:

Human Threats:

Resource Threats:

Environmental Threats:

Application Threats:

Trust Threats: