As a user of a managed Kubernetes cluster, someone else is responsible for security, right? Wrong! Well, at least that‘s not the whole truth. There are plenty of security options available when using K8s: RBAC, securityContexts, Network Policies, PodSecurityPolicies, Kernel Security Modules, etc.
But which ones are relevant for developers? And which are the most important ones?
This talk describes our good practices for K8s security established throughout the last years while developing and operating apps on K8s clusters. It features security options that can be applied with reasonable effort in our everyday lives as developers and shows the effects of these options on application security.