Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Best practices for securing your Kubernetes cluster.pptx

40 views

Published on

Kubernetes is currently the most popular container orchestration engine of choice, but its security is debatable. There are some vulnerabilities that have already been discovered in Kubernetes and Docker. The question that arises is what are the potential risks of these vulnerabilities to the application/business, and how we can go about fixing these.

The talk will also cover what are some of the best security practices that should be followed while designing and implementing Kubernetes within an organisation.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Best practices for securing your Kubernetes cluster.pptx

  1. 1. ● ● ● ●
  2. 2. ● ●
  3. 3. ● ● ○ ○
  4. 4. ● ○ ○ ○ ●
  5. 5. ● ○ ○
  6. 6.
  7. 7. ● ● ●
  8. 8. ● ○ ○
  9. 9. ● ○ ○
  10. 10. ● ○ Kubernetes by default adoes not restrict traffic between pods running inside the cluster. This means any pod can connect to any other pod as there are no firewalls controlling the intra-cluster trafficpply network policies to help us achieve the desired isolation. ○ The Kubernetes NetworkPolicy enables us to apply ingress and egress rules to selected pods — for layer 3 and layer 4 traffic ● ● ● ●
  11. 11.
  12. 12. ● ○ ○ ○ ○
  13. 13. ● ○ ○
  14. 14. ● ●
  15. 15. ● ●

×