🎤Speaking at KubeCon EU 2026Lessons Learned Orchestrating Multi-Tenant GPUs on OpenShift AIView Session

🔐 Security Recipes

Secure your Kubernetes clusters with RBAC, Secrets management, Pod Security Standards, service accounts, and security best practices.

23 recipes available

Intermediate

Kyverno Policy Management and Enforcement

Implement Kubernetes-native policy management using Kyverno to validate, mutate, and generate resources with declarative policies written in YAML

⏱ 45 minutes K8s 1.28+

How to Configure Pod Security Context

Secure your Kubernetes pods with Security Context settings. Learn to set user/group IDs, file system permissions, capabilities, and privilege escalation controls.

⏱ 20 minutes K8s 1.28+

How to Use Sealed Secrets for GitOps

Encrypt Kubernetes secrets for safe Git storage with Sealed Secrets. Learn to seal, manage, and rotate secrets in GitOps workflows securely.

⏱ 25 minutes K8s 1.28+

How to Use Workload Identity for Cloud Access

Securely access cloud services from Kubernetes pods without static credentials. Configure Workload Identity for AWS, Azure, and GCP with IRSA, Workload Identity, and Federation.

⏱ 30 minutes K8s 1.28+

How to Manage Kubernetes Certificates with cert-manager

Automate TLS certificate management with cert-manager. Configure issuers, request certificates from Let's Encrypt, and enable automatic renewal.

⏱ 15 minutes K8s 1.28+

How to Implement Container Security Scanning

Scan container images for vulnerabilities before deployment. Integrate Trivy and other tools into CI/CD pipelines and runtime admission control.

⏱ 15 minutes K8s 1.28+

How to Use External Secrets Operator

Sync secrets from external providers like AWS Secrets Manager, HashiCorp Vault, and Azure Key Vault into Kubernetes using External Secrets Operator.

⏱ 15 minutes K8s 1.28+

How to Create Custom Admission Controllers with Kyverno

Implement policy-as-code with Kyverno. Validate, mutate, and generate Kubernetes resources without writing webhook code.

⏱ 15 minutes K8s 1.28+

How to Configure Pod Security Admission

Enforce security standards with Pod Security Admission. Configure privileged, baseline, and restricted policies at namespace level for cluster-wide security.

⏱ 15 minutes K8s 1.28+

How to Manage Kubernetes Secrets Securely

Best practices for managing secrets in Kubernetes. Learn encryption at rest, secret rotation, and integration with external secret stores.

⏱ 15 minutes K8s 1.28+

How to Configure Service Accounts and RBAC

Secure your Kubernetes workloads with service accounts and role-based access control. Create roles, bindings, and implement least-privilege access patterns.

⏱ 15 minutes K8s 1.28+

How to Scan Container Images for Vulnerabilities

Implement container image scanning in Kubernetes using Trivy. Learn to scan images in CI/CD, admission controllers, and runtime.

⏱ 25 minutes K8s 1.28+

How to Implement Pod Security Standards

Secure your Kubernetes workloads using Pod Security Standards (PSS). Learn to enforce Privileged, Baseline, and Restricted policies at the namespace level.

⏱ 25 minutes K8s 1.28+

How to Configure RBAC and Service Accounts

Master Kubernetes RBAC (Role-Based Access Control) to secure your cluster. Learn to create Roles, ClusterRoles, and bind them to ServiceAccounts.

⏱ 30 minutes K8s 1.28+

Advanced

How to Integrate HashiCorp Vault with Kubernetes

Securely manage secrets with HashiCorp Vault in Kubernetes. Learn to inject secrets into pods using the Vault Agent Injector and CSI Provider.

⏱ 40 minutes K8s 1.28+

Secure Containers with gVisor Runtime

Enhance container isolation using gVisor sandbox runtime to add an additional security layer between containers and the host kernel for untrusted workloads

⏱ 45 minutes K8s 1.28+

OIDC Authentication for Kubernetes

Configure OpenID Connect (OIDC) authentication to integrate Kubernetes with identity providers like Keycloak, Okta, Azure AD, and Google for secure user access

⏱ 50 minutes K8s 1.28+

How to Configure Kubernetes API Access Control

Set up secure API server access with authentication and authorization. Configure RBAC, API groups, and audit logging for cluster security.

⏱ 15 minutes K8s 1.28+

How to Create Admission Webhooks

Build validating and mutating admission webhooks to enforce policies and modify resources. Implement custom admission controllers for Kubernetes.

⏱ 15 minutes K8s 1.28+

How to Configure Kubernetes Audit Logging

Enable and configure Kubernetes API audit logging. Track who did what, when, and to which resources for security compliance and troubleshooting.

⏱ 15 minutes K8s 1.28+

How to Use Kubernetes RuntimeClass

Configure different container runtimes for workloads. Use gVisor, Kata Containers, or other runtimes for enhanced security and isolation.

⏱ 15 minutes K8s 1.28+

How to Implement Advanced NetworkPolicies

Master advanced Kubernetes NetworkPolicies for fine-grained traffic control. Learn egress rules, CIDR blocks, namespace isolation, and common security patterns.

⏱ 15 minutes K8s 1.28+

How to Encrypt Secrets at Rest with KMS

Configure Kubernetes secrets encryption at rest using external KMS providers. Learn to set up AWS KMS, GCP KMS, and Azure Key Vault encryption.

⏱ 15 minutes K8s 1.28+

Want more security patterns?

Our book includes an entire chapter dedicated to security with dozens more examples.

📖 Explore All Chapters