Pod Security
Pod Security Standards
Kubernetes Pod Security Standards define three policies:
Privileged: Unrestricted policy
Baseline: Minimally restrictive policy
Restricted: Highly restrictive policy for security-critical applications
Pod Security Admission Controller
Modern Security Context Examples
Restricted Policy Compliant Pod:
RuntimeClass Integration:
OPA/Gatekeeper Policy Examples
Require Non-Root Users:
Enforce Security Context:
Network Policy Examples
Modern zero-trust network policy:
Best Practices for 2024+
Pod Security Standards Adoption
Enable Pod Security Admission controller
Use "restricted" policy by default
Implement exceptions only when necessary
Runtime Security
Use gVisor or kata-containers for isolation
Enable SeccompProfile
Implement Falco for runtime monitoring
Supply Chain Security
Sign container images
Use cosign for verification
Implement admission controllers
Zero Trust Implementation
Default deny network policies
Explicit allow rules only
Regular audit logging
Resource Constraints
Set CPU/Memory limits
Configure OOM score
Use resource quotas
Last updated