
This document guides you through preparing a single-node Kubernetes lab on Proxmox to deploy and harden the VulnBank application. It covers namespace architecture, a lightweight API gateway selection (Kong vs Traefik), ingress design, and a phased execution plan with concrete manifests and commands.
Audience: AppSec Engineer in the financial sector.
| 1 | Project Overview & Objectives |
|---|
The core idea of this lab is not to fix the vulnerable code in VulnBank. it is to wrap it in the same kind of layered infrastructure controls that financial institutions apply around legacy and third-party applications they cannot fully patch. This is a realistic simulation of how AppSec operates in practice in the financial sector.
| *Core Philosophy
****"Code will always be vulnerable. The infra controls around it are what protect the bank."
| This maps directly to real financial environments: core banking monoliths running with known CVEs, protected by WAFs, API gateways, network policies, and runtime anomaly detection, not by fully patched code.* |
|---|
/internal/*, /api/admin/*, /api/docs from public reach| Component | Allocation |
|---|---|
| CPU | 4 vCPUs |
| RAM | 12 GiB (VM) |
| Disk | 40 GiB boot disk |
| K8s Version | Single-node |
| Network | IPs via Proxmox bridge |