Levent Ogut
Levent's blog

Follow

Levent's blog

Follow
Kubernetes Network Policies: A Practitioner's Guide

Kubernetes Network Policies: A Practitioner's Guide

Levent Ogut's photo
Levent Ogut
·Sep 7, 2021·

1 min read

Play this article

Originally posted at Loft Labs Blog. © All rights belong to Loft Labs, Inc..

This is one of the posts I have written for Loft Labs, Inc..

Providing security for our infrastructure and applications is a never-ending continuous process. This article will talk about security in Kubernetes clusters, traffic incoming and outgoing to/from the cluster, and the traffic within the cluster. Some organizations behave as if their own workloads can be malicious and design their security policies accordingly. In addition, in today’s world, we all use third-party plugins, libraries, and pieces of code from external resources. Although this has been increasing productivity, this also brings many security concerns. Isolating the traffic incoming and outgoing to our applications to only what’s absolutely necessary is one of the best approaches there is.

Photo by Marek Piwnicki on Unsplash

 
Share this