Skip to content

Kubernetes: Best Practices, Part Two

Published on

Security best practices including enable authentication using OIDC or X.509 certificates and use service account tokens for applications and workloads, use namespaces to establish security boundaries, limit resource usage on the cluster using quotas, and separate sensitive workloads to reduce the risk of sensitive applications being accessed by less secure applications that share a container runtime or host.