DevOps Articles

Curated articles, resources, tips and trends from the DevOps World.

How to Give Kubernetes Immunity from Privilege Escalation

2 years ago thenewstack.io
How to Give Kubernetes Immunity from Privilege Escalation

Summary: This is a summary of an article originally published by The New Stack. Read the full original article here →

This is part of a series of contributed articles leading up to KubeCon + CloudNativeCon on Oct. 24-28. Security across virtualized and physical infrastructure environments has been refined over the past 20 years into a highly sophisticated craft that enables precise control over the access and availability of application workloads.

One of the cybersecurity pillars is application isolation through various forms of confinement, either through logical or physical separation.

When augmented by additional components like advanced container network interface and container storage interface providers, network transport and data at rest can also be confined to their workload applications purview.

When combined with traditional security practices at both physical, network, storage and virtualization layers, they ensure that there is a higher degree of confidence when running application workloads within Kubernetes.

Made with pure grit © 2024 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com