KubeArmor Securing Your Runtime
As the popularity of Kubernetes grows, so does the need for robust security measures to protect workloads. We learned how to secure a cluster using RBAC, which allows us to control the access that users have to resources. Using RBAC, we can control what users can execute on a cluster, controlling if someone can create or delete a pod, view logs, view Secrets, etc. We also looked at securing clusters using Gatekeeper policies that can protect nodes by denying the creation of an object that contains a value against security policies like attempting to allow privilege escalation.
While these go a long way to securing clusters, there are certain actions that are often overlooked by many organizations. One of the most important examples is securing the container runtime.
Kubernetes has limited abilities to audit or secure actions that are executed within a container. While Kubernetes can handle certain security requirements like blocking elevated...