Summary
In this chapter, we explored how to use Gatekeeper as a dynamic admission controller to provide additional authorization policies on top of Kubernetes’ built-in RBAC capabilities. We looked at how Gatekeeper and OPA are architected. Then, we learned how to build, deploy, and test policies in Rego. Finally, you were shown how to use Gatekeeper’s built-in mutation support to create default configuration options in pods.
Extending Kubernetes’ policies leads to a stronger security profile in your clusters and provides greater confidence in the integrity of the workloads you are running.
Using Gatekeeper can also help catch previously missed policy violations through its application of continuous audits. Using these capabilities will provide a stronger foundation for your cluster.
This chapter focused on whether or not to launch a pod based on our specific policies. In the next chapter, we’ll learn how to protect your nodes from the processes...