Securing workloads and apps
Kubernetes provides different built-in and third-party solutions to ensure that your production workloads are running securely. We will explore what we regard as a must-have for your cluster before going to production, such as workload isolation techniques, pod security policies, network policies, and monitoring workload runtime security.
Isolating critical workloads
Kubernetes, by design, has a single control plane for each cluster, which makes sharing a single cluster among tenants and workloads challenging, and requires the cluster owners to have a clear strategy about cluster multi-tenancy and resource sharing.
There are different use cases where it is critical to address tenant and workload isolation:
- In many organizations, there are multiple teams, products, or environments that share a cluster.
- There are cases where you provide Kubernetes as a service for your own organization or external organizations.
- Also, there is a...