Don't allow 'dev', 'latest', or 'master' image tags in prod
9
Prevent Privileged Pods
10
Prevent sensitive host system mounts
11
Make the container filesystem read only
12
Prevent NodePort Services
13
Resources Example Policies
Description:
Explore the critical role of admission controllers in Kubernetes security and governance through this comprehensive webinar. Gain insights into the Kubernetes Admission Controller architecture, focusing on the Validating Admission Controller function and its integration with Open Policy Agent and Rego language. Examine real-world scenarios involving misconfiguration and potential security threats, and learn how to implement effective admission control policies. Acquire knowledge on object creation in Kubernetes, master the basics of the Rego language for writing admission controller policies, and obtain sample policies for enhancing security and IT governance. Delve into common Kubernetes attack vectors, mitigation strategies, and security best practices, including enforcing trusted registries, preventing privileged pods, and securing container filesystems. Led by cloud experts from Palo Alto Networks, this 56-minute session equips you with practical skills to strengthen your Kubernetes environment's security posture.
Read more
Admission Controllers - One Part of Your Kubernetes Security and Governance Toolkit