image.png

Document Purpose

This document guides you through preparing a single-node Kubernetes lab on Proxmox to deploy and harden the VulnBank application. It covers namespace architecture, a lightweight API gateway selection (Kong vs Traefik), ingress design, and a phased execution plan with concrete manifests and commands.

Audience: AppSec Engineer in the financial sector.


1 Project Overview & Objectives

1.0 What We Are Building

The core idea of this lab is not to fix the vulnerable code in VulnBank. it is to wrap it in the same kind of layered infrastructure controls that financial institutions apply around legacy and third-party applications they cannot fully patch. This is a realistic simulation of how AppSec operates in practice in the financial sector.

| *Core Philosophy

****"Code will always be vulnerable. The infra controls around it are what protect the bank."

This maps directly to real financial environments: core banking monoliths running with known CVEs, protected by WAFs, API gateways, network policies, and runtime anomaly detection, not by fully patched code.*

1.1 Lab Goals

1.2 Hardware Used

Component Allocation
CPU 4 vCPUs
RAM 12 GiB (VM)
Disk 40 GiB boot disk
K8s Version Single-node
Network IPs via Proxmox bridge