K8s Preventing Privileged Pods using Pod Security Admission / Standards
Prevent privileged pods from being created to improve security of your K8s cluster. This video shows how to do this using Pod Security Admission/Standards through a fun hands-on screenshare with explanations.
Blog post: https://samos-it.com/posts/Preventing-Privileged-pods-using-Pod-Security-Admission-Standards.html
Content
0:00 Introduction
1:42 Background on Pod Security Standards and Admission
2:43 Enforcing Baseline Pod Security Standard on default namespace
4:28 Verify privileged pods are being blocked
In a Kubernetes cluster, a privileged pod is a pod that has been given extended permissions beyond the default set of permissions. These extended permissions can include the ability to access the host's network, devices, and other sensitive resources. While privileged pods can be useful in certain situations, they also present a significant security risk.
In this video, you will learn how to prevent privileged pods using Pod Security Admission and applying Pod Security Standards. Note that using Pod Security Policy (another method to prevent privileged pods) has been deprecated in 1.23 and removed in 1.25. So it's important you adopt Pod Security Admission / Standards instead of PSP.
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Related AI Lessons
⚡
⚡
⚡
⚡
The 5-Year Gap Between Employees Who Master AI and Those Who Don’t
Medium · Data Science
Meta announced major job cuts, spends billions on AI
Medium · AI
DeepSeek made its 75% discount permanent. The AI price war just escalated.
The Next Web AI
Anthropic's Milan Move: Italian AI's Moment of Truth
Dev.to · Gian Paolo
Chapters (4)
Introduction
1:42
Background on Pod Security Standards and Admission
2:43
Enforcing Baseline Pod Security Standard on default namespace
4:28
Verify privileged pods are being blocked
🎓
Tutor Explanation
DeepCamp AI