Containers & Kubernetes have revolutionized the way applications are deployed at scale. One of the top concerns that every enterprise faces is to optimize the underlying infrastructure for containers. Although K8s comes with significant built-in features designed specifically for simplifying container orchestration, configuring, deploying, and managing them may be a bit overwhelming for an organization. In many cases, a lack of expertise with containers & K8s has given way to misconceptions and deep-rooted concerns. Many sources point to security remaining the top concern when it comes to Kubernetes adoption.

StackRox released the ‘State of Kubernetes and container safety report’ in Sep 2020, in which it found that nearly 90% of the respondents have experienced a security incident over the last 12 months.

One reason for this could be the uncertainties and risks associated with security during each deployment phase. The K8s era has triggered the left-shifting of security, which calls for effective collaboration between security, DevOps, and dev throughout the development lifecycle. In this article, we will look at a few common myths around K8s security and try to arrive at actionable workarounds.

#rbac #container-security #containerization #kubernetes #kubernetes-security

Kubernetes Security: Common Myths & Facts
1.10 GEEK