As the adoption of Kubernetes (K8s) continues to expand, one topic that often comes up is security. Since K8s is used to run applications on a large scale and controls who and what can be done with these applications, security should be well-understood and managed.
This whitepaper provides an overview of key aspects and best practices of K8s security, including:
- Securing the cluster
- Managing authorization and authentication
- Implementing a trusted software supply chain
- Securing workloads in runtime
- Managing secrets