K8s security - part 0 - Security Model
Prerequisite You already know Kubernetes architecture, its components and have notions of cybersecurity.
Abstract In this introduction of a series devoted to Kubernetes security, we will first see that Kubernetes, although very popular and used by thousands of companies, is very hard to completely protect from attacks espescially if you create and operate your own cluster. Vulnerabilities have been discovered in the past and have sometimes been exploited by attackers. We will explore what makes Kubernetes hard to secure by default and propose a model that represents the layers that need to be secured.
[Read More]