Whitepapers

Defining Security for a Kubernetes Deployment

resource-11

The focus of this whitepaper is not on how to secure a Kubernetes cluster but on how to secure workloads deployed in the cluster. For a DIY Kubernetes deployment, it’s very important to understand basic hygiene and follow best practices for securing the Kubernetes cluster in itself. Some basic security hygiene includes: ensuring the use of Role Based Access Control (RBAC) for managing the cluster, only exposing what is required to the internet (for instance, don’t expose your Kubernetes dashboard) never use default passwords for any administrative accounts, and utilize kubeadm too bootstrap your cluster.