eGuide: Top 10 Kubernetes Security Best Practices
The latest CNCF-led open-source Kubernetes security audit highlights more than 30 flaws found in Kubernetes clusters. We've identified top-10 flaws in this short eBook that also highlights what checks to implement in order to fix and stay secure.
Here are two quick examples:
- Enable CPU/Mem requests and limits not set on a deployment
- Control the container images deployed into your cluster