Category: Software, Security, Kubernetes, Docker, encryption

Sure, Kubernetes gives us a good set of core software security principles to work with, but we still have to understand them and implement them. With a distributed deployment such as a Kubernetes cluster, the number of attack vectors increases, and it is important to know the best practices for limiting those attack surfaces as much as possible. Even when using a managed Kubernetes service, some ownership of security still falls to us end users.

Oracle Kubernetes Engine, for example, offers multiple options to secure communication to and from the workloads in your cluster.

If using Oracle Kubernetes Engine, you can set up pod security policies for the cluster as explained in the documentation.

Related Articles