Rico Komenda
Kubernetes Security Best Practices
#1about 1 minute
The prevalence and impact of Kubernetes security incidents
Most organizations have experienced a Kubernetes security incident in the last year, commonly caused by runtime issues or cluster misconfigurations.
#2about 2 minutes
Applying the 4 Cs model to cloud native security
The 4 Cs model provides a framework for securing the entire stack, from the cloud infrastructure and cluster to the container and code.
#3about 3 minutes
Securing container images against common vulnerabilities
Prevent container breakouts by scanning images for vulnerabilities, using trusted registries, and removing unnecessary dependencies.
#4about 4 minutes
Hardening pods with security contexts and standards
Enhance pod security by running containers as non-root users, disabling privilege escalation, and enforcing policies with Pod Security Standards.
#5about 3 minutes
Implementing the principle of least privilege with RBAC
Use Role-Based Access Control (RBAC) to grant users and service accounts only the specific permissions they need at the namespace level.
#6about 2 minutes
Isolating pod-to-pod traffic with network policies
Restrict communication between pods by default and define explicit allow rules using network policies and CNI plugins like Calico.
#7about 2 minutes
Protecting the critical ETCD datastore from unauthorized access
Secure the cluster's central datastore, etcd, by enforcing TLS communication with the API server and using a separate certificate authority.
#8about 1 minute
Automating policy enforcement with admission controllers
Use tools like Kyverno, Kubewarden, or OPA Gatekeeper as admission controllers to automatically validate and enforce security policies at scale.
#9about 2 minutes
Key takeaways for hardening Kubernetes clusters
A summary of essential practices includes hardening images, using RBAC, isolating traffic, protecting etcd, and automating policy enforcement.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
56:21 MIN
Security best practices for containers and Kubernetes
Microservices: how to get started with Spring Boot and Kubernetes
39:53 MIN
Q&A on managed Kubernetes security in the cloud
Kubernetes Security - Challenge and Opportunity
20:26 MIN
Identifying common Kubernetes security vulnerabilities
Kubernetes Security - Challenge and Opportunity
22:09 MIN
Centralizing security services in a Kubernetes ecosystem
DevSecOps: Security in DevOps
01:46 MIN
Understanding the Kubernetes threat landscape and adversaries
Hacking Kubernetes: Live Demo Marathon
07:14 MIN
Addressing unique data protection challenges in Kubernetes
It's all about the Data
34:27 MIN
Addressing networking and multi-tenancy security challenges
Kubernetes Security - Challenge and Opportunity
1:13:05 MIN
Securing containers and infrastructure as code (IAC)
Maturity assessment for technicians or how I learned to love OWASP SAMM
Featured Partners
Related Videos
Kubernetes Security - Challenge and Opportunity
Marc Nimmerrichter
Hacking Kubernetes: Live Demo Marathon
Andrew Martin
Enhancing Workload Security in Kubernetes
Dimitrij Klesev & Andreas Zeissner
Turning Container security up to 11 with Capabilities
Mathias Tausig
Chaos in Containers - Unleashing Resilience
Maish Saidel-Keesing
Supply Chain Security and the Real World: Lessons From Incidents
Adrian Mouat
Mastering Kubernetes – Beginner Edition
Hannes Norbert Göring
Securing secrets in the GitOps Era
Davide Imola
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.



Kubernetes Lifecycle & Security Engineer / Distributed Cloud - STACKIT (gn)
Webseite STACKIT
Intermediate
Kubernetes

Kubernetes Lifecycle & Security Engineer / Distributed Cloud - STACKIT
Schwarz Unternehmenskommunikation GmbH & Co. KG
Senior
Kubernetes


Technical Application Specialist - Kubernetes / Digital Certificates
Lloyd's
€47-53K
DevOps
Jenkins
Terraform
Kubernetes


