Summary
In this chapter, we looked at strengthening the security of our runtime environment, enhancing your overall security posture. It’s a common misconception that an organization’s clusters are secured since many of them tend to overlook the content running within containers or the implications of a user connecting to a running pod using kubectl exec
.
This chapter also described in detail how one of the most effective approaches to container security involves tightly controlling the container’s processes, exclusively allowing the execution of only the necessary processes while denying access to all other files. By leveraging a tool like KubeArmor, you can grant access to specific files from a restricted set of binaries, blocking access to and securing all other processes.