Security and limitations for Pods and networking

We discuss the importance of restricting permissions and access for Pods, how to manage network policies, and how to enhance the security of your applications.

Section 6

Security and constraints for Pods and networking

In this section, Gabriel Paues from Safespring and Lars Larsson from Elastisys examine the security aspects of running applications on Kubernetes. You will learn about the importance of restricting permissions and access for Pods, how to manage network policies, and how to improve the security of your applications by following best practices.

Princip 14 Restrict permissions
Princip 15 Limit attack surface

Watch next webinar

Many companies and authorities choose to build their secure cloud services on Safespring's platform. Take part in several informative webinars.