Skip to main content

21 docs tagged with "best-practice"

View all tags

DNS Security in Kubernetes

Protect CoreDNS from spoofing, cache poisoning, DNS tunneling, and unauthorized modifications to enhance Kubernetes cluster security.

Egress Control in Kubernetes

Restrict and monitor outbound traffic from Kubernetes workloads to prevent data exfiltration, command-and-control communication, and unauthorized external access.

Fine-grained Kubelet API Authorization

How to use KubeletFineGrainedAuthz (GA in Kubernetes v1.36) to grant least-privilege access to specific kubelet API endpoints without the broad nodes/proxy permission.

Kubelet Security Overview

Overview of Kubernetes Kubelet security covering authentication, authorization, TLS, resource limits, and hardening best practices.

Kubernetes Audit Logging

How to configure Kubernetes audit logging to record API server activity for security monitoring, incident detection, and compliance requirements.

Network Policies

Explore how Network Policies in Kubernetes control traffic flow and enhance security.

Pod Security Standards (PSS)

Learn how Kubernetes Pod Security Standards (PSS) enforce security controls for workloads and replace the deprecated Pod Security Policies (PSP).

Removing gitRepo Volumes in Kubernetes

Why the gitRepo volume driver was removed in Kubernetes v1.36, and how to migrate existing workloads to the init container pattern recommended by kubernetes.io.

Securing Debug Container Access

How to control ephemeral container and kubectl debug access through RBAC, Pod Security Standards, and admission control in Kubernetes.

Securing Persistent Volumes

How to protect Kubernetes PersistentVolumes from unauthorized access, data exposure, and cross-namespace attacks through proper configuration and RBAC.

Service Mesh Security

Improve Kubernetes security by implementing mutual TLS (mTLS), zero-trust networking, and policy-based access control using service meshes like Istio, Linkerd, and Cilium.

Sysctl Security in Kubernetes

How to safely configure kernel parameters via sysctls in Kubernetes pods, distinguish safe from unsafe sysctls, and enforce restrictions using Pod Security Standards.

User Namespaces in Kubernetes

How to use Linux user namespaces in Kubernetes pods to isolate container UIDs from the host and reduce the blast radius of container escapes.