Skip to main content

8 docs tagged with "pod-security"

View all tags

Compromised Sidecars

How attackers exploit insecure or malicious sidecar containers to intercept data, escalate privileges, and persist within Kubernetes clusters.

Container Escape

How an attacker can break out of a container and gain control over the host system in Kubernetes.

Ephemeral Debug Container Abuse

How attackers abuse kubectl debug and ephemeral containers to inject debugging tools, access process namespaces, and compromise Kubernetes workloads.

kube-psp-advisor

kube-psp-advisor generates Pod Security Policies and Pod Security Standards based on the actual security requirements of running workloads.

Pod Security Standards (PSS)

Learn how Kubernetes Pod Security Standards (PSS) enforce security controls for workloads and replace the deprecated Pod Security Policies (PSP).

Securing Debug Container Access

How to control ephemeral container and kubectl debug access through RBAC, Pod Security Standards, and admission control in Kubernetes.

Securing Persistent Volumes

How to protect Kubernetes PersistentVolumes from unauthorized access, data exposure, and cross-namespace attacks through proper configuration and RBAC.

Unrestricted HostPath Mounts

How attackers exploit unrestricted hostPath mounts to gain access to the host filesystem and escalate privileges.