Skip to content

Kubernetes: Best Practices, Part One

Published on

Security best practices including secure the base OS, upgrade to the latest version, design with a private topology, firewall inbound traffic, utilize a bastion host for SSH access, harden according to the CIS Kubernetes Benchmark, control access to the Kubernetes API, restrict access to etcd, and disable default service account and dashboard.