César D. Velandia

K8s Security

Securing infrastructure and workloads running in Kubernetes
  • Layered defense: Infra + Cluster + Container + Code
Cluster
Host system
Applications
Supply chain
etc.

Setup

Network policies

CIS Benchmarks

Ingress

Attack surfaces

Binary verification

Hardening

Cluster

System

Microservices Vulnerabilities

Supply Chain

Monitoring

Logging

Runtime security

References

Securing a Cluster
This document covers topics related to protecting a cluster from accidental or malicious access and provides recommendations on overall security.Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is reco…