This is the 3rd part of IN4IT’s “Kubernetes Security blog series”. In this blog we are going to cover what Pod Security Policies are. How can they help you secure your Kubernetes cluster and how to implement them. What is a Pod Security Policy? A Pod Security Policy controls the security-related aspects of a pod […]
This is our second article in the “Kubernetes Security series”. This article talks about Secret Management in Kubernetes. Once you start deploying applications to Kubernetes, you quickly realize Secrets Management takes a lot of time to get right. The Kubernetes Secret and ConfigMap objects don’t yet have all the features you’d expect to properly setup […]
This is the first part of our “Kubernetes Security Series”. In this part I’m going to explain how Network Policies can help you secure your network traffic within your Kubernetes cluster. Filtering network traffic First of all, you need to think about what kind of network traffic you want to filter. The easiest way filtering […]