Skip to main content

14 docs tagged with "pod-security"

View all tags

Compromised Sidecars

How attackers exploit insecure or malicious sidecar containers to intercept data, escalate privileges, and persist within Kubernetes clusters.

Container Escape

How an attacker can break out of a container and gain control over the host system in Kubernetes.

Ephemeral Debug Container Abuse

How attackers abuse kubectl debug and ephemeral containers to inject debugging tools, access process namespaces, and compromise Kubernetes workloads.

kube-psp-advisor

kube-psp-advisor generates Pod Security Policies and Pod Security Standards based on the actual security requirements of running workloads.

Pod Security Standards (PSS)

Learn how Kubernetes Pod Security Standards (PSS) enforce security controls for workloads and replace the deprecated Pod Security Policies (PSP).

Removing gitRepo Volumes in Kubernetes

Why the gitRepo volume driver was removed in Kubernetes v1.36, and how to migrate existing workloads to the init container pattern recommended by kubernetes.io.

Securing Debug Container Access

How to control ephemeral container and kubectl debug access through RBAC, Pod Security Standards, and admission control in Kubernetes.

Securing Persistent Volumes

How to protect Kubernetes PersistentVolumes from unauthorized access, data exposure, and cross-namespace attacks through proper configuration and RBAC.

Sysctl Security in Kubernetes

How to safely configure kernel parameters via sysctls in Kubernetes pods, distinguish safe from unsafe sysctls, and enforce restrictions using Pod Security Standards.

Unrestricted HostPath Mounts

How attackers exploit unrestricted hostPath mounts to gain access to the host filesystem and escalate privileges.

User Namespaces in Kubernetes

How to use Linux user namespaces in Kubernetes pods to isolate container UIDs from the host and reduce the blast radius of container escapes.