Three Ways to Secure Kubernetes From Inside Threats



  • This is the second of a series of three articles focusing on Kubernetes security: the outside attack, the inside attack, and dealing with resource consumption or noisy neighbors. Inherently, Kubernetes clusters are multi-user. As a result, organizations want to ensure that cross-communication is protected via role-based access control, logical isolation and network policies. A container orchestration system such as Kubernetes brings information technology operations and developers (DevOps) closer together, making it easier for teams to collaborate effectively and efficiently with each other.

    https://rancher.com/blog/2019/secure-kubernetes-from-inside-threads/

Log in to reply
 

© Lightnetics 2024