πŸ“šBook Signing at KubeCon EU 2026Meet us at Booking.com HQ (Mon 18:30-21:00) & vCluster booth #521 (Tue 24 Mar, 12:30-1:30pm) β€” free book giveaway!RSVP Booking.com Event

πŸ”’ Security

Secure your clusters: RBAC, Pod Security Standards, Network Policies, secrets management, image scanning, RHACS, OpenClaw security hardening, and compliance automation.

62 recipes 🟒 1 beginner 🟑 40 intermediate πŸ”΄ 21 advanced
advanced ⏱ 15 minutes

Kubernetes Multi-Tenancy Patterns

Implement multi-tenancy in Kubernetes with namespaces, RBAC, quotas, network policies, and virtual clusters. Covers soft and hard tenancy models.

multi-tenancynamespacesisolationquotas
intermediate ⏱ 15 minutes

Kubernetes Security Checklist for Production

Production security checklist for Kubernetes clusters. Covers RBAC, network policies, pod security, secrets encryption, audit logging, and image scanning.

security-checklisthardeningproductioncompliance
intermediate ⏱ 15 minutes

Kubernetes RBAC: Roles, ClusterRoles, and Bindings

Configure Kubernetes RBAC with Roles, ClusterRoles, RoleBindings, and service accounts. Least privilege access control for users, groups, and applications.

rbacrolesclusterrolerolebinding
beginner ⏱ 15 minutes

Kubernetes Secrets: Create, Use, and Secure

Create and manage Kubernetes Secrets for sensitive data. Covers types, encoding, mounting, external secrets operators, and encryption at rest best practices.

secretssecurityencryptionbase64
advanced ⏱ 15 minutes

Fix Kubernetes Certificate Expiry Issues

Debug and renew expired Kubernetes certificates for API server, kubelet, and etcd. Covers kubeadm cert renewal, OpenShift auto-rotation, and monitoring expiry.

certificatestlsexpirykubeadm
advanced ⏱ 15 minutes

Confidential Computing on Kubernetes

Deploy confidential containers with encrypted memory using Intel SGX, AMD SEV-SNP, and Kata Containers. Protect data in use from even the cluster admin.

confidential-computingsgxsev-snpkata-containers
advanced ⏱ 15 minutes

Kubernetes Admission Controllers and Webhooks

Build validating and mutating admission webhooks for Kubernetes. Policy enforcement with OPA Gatekeeper, Kyverno, and custom webhooks.

admission-controllerswebhooksopakyverno
intermediate ⏱ 15 minutes

Kubernetes Pod Security Standards Guide

Implement Pod Security Standards (PSS) with Pod Security Admission. Configure privileged, baseline, and restricted profiles for namespace-level pod security.

pod-securitypsspsasecurity-context
intermediate ⏱ 15 minutes

Kubernetes Secrets Management Best Practices

Secure secrets in Kubernetes with External Secrets Operator, Sealed Secrets, Vault, and SOPS. Encryption at rest, rotation, and zero-trust patterns.

secretsvaultexternal-secretsencryption
intermediate ⏱ 15 minutes

Kubernetes Service Accounts and Token Management

Configure service accounts, bound tokens, OIDC federation, and workload identity for Kubernetes. Migrate from legacy tokens to projected volumes.

service-accountstokensoidcworkload-identity
intermediate ⏱ 15 minutes

Fix RBAC Permission Denied Errors

Debug RBAC forbidden and unauthorized errors in Kubernetes. Covers ClusterRole vs Role scope and service account permissions.

rbacforbiddenpermissionsserviceaccount
advanced ⏱ 30 minutes

Harden Kubernetes Security Posture

Kubernetes security hardening: Pod Security Standards, RBAC least-privilege, network policies, secret encryption, and audit logging.

securityhardeningpssrbac
advanced ⏱ 30 minutes

OpenClaw API Keys with External Secrets Operator

Manage OpenClaw API keys and gateway tokens using External Secrets Operator with AWS Secrets Manager, Vault, or GCP Secret Manager on Kubernetes.

openclawexternal-secretsvaultaws-secrets-manager
intermediate ⏱ 20 minutes

OpenClaw Pod Security Hardening on Kubernetes

Harden OpenClaw pods with read-only filesystem, dropped capabilities, non-root user, seccomp profiles, and resource limits.

openclawpod-securityhardeningseccomp
intermediate ⏱ 15 minutes

Quay Default Permissions for Robot Accounts

Configure Quay Registry default permissions to auto-grant read access to robot accounts on every new repository. API and team patterns.

quayrobot-accountpermissionsregistry
intermediate ⏱ 20 minutes

Add Custom CA Certificates in OpenShift

Configure custom Certificate Authority trust across an OpenShift cluster using proxy config, image config, and automatic CA bundle injection into pods.

openshiftcertificatescatls
intermediate ⏱ 25 minutes

Add Custom CA in OpenShift and Kubernetes

Configure custom Certificate Authority trust in both OpenShift and vanilla Kubernetes for private registries, internal services, and corporate PKI.

certificatescatlsopenshift
intermediate ⏱ 20 minutes

Add Custom CA Certificates in Kubernetes

Configure custom Certificate Authority trust in vanilla Kubernetes using ConfigMap mounts, node-level trust stores, and containerd registry configuration.

certificatescatlssecurity
intermediate ⏱ 15 minutes

GPU Tenant Bootstrap Bundle

Provision GPU tenants with a single Kustomize bundle containing namespace, RBAC, NetworkPolicy, quotas, and HAProxy VIP config.

multi-tenantkustomizegputenant
intermediate ⏱ 15 minutes

Multi-Tenant GPU Namespace Isolation

Isolate GPU workloads across tenants using namespaces, RBAC, NetworkPolicy, and ResourceQuotas on OpenShift and Kubernetes.

multi-tenantgpunamespaceisolation
intermediate ⏱ 15 minutes

NetworkPolicy Deny-Default for GPU Tenants

Implement deny-by-default NetworkPolicy for GPU tenant namespaces with NCCL port exceptions and DNS egress on Kubernetes.

networkpolicymulti-tenantgpunccl
intermediate ⏱ 15 minutes

Network Policies for OpenClaw on Kubernetes

Secure OpenClaw deployments with Kubernetes NetworkPolicies to restrict egress to messaging APIs, block unauthorized ingress, and isolate the gateway.

openclawnetwork-policysecurityegress
advanced ⏱ 15 minutes

OpenClaw RBAC and Multi-Tenant Isolation

Configure OpenClaw RBAC policies and namespace isolation for multi-tenant Kubernetes clusters with per-team agent access controls.

openclawrbacmulti-tenancysecurity
intermediate ⏱ 20 minutes

Secure Secrets Management for OpenClaw on Kubernetes

Manage API keys, bot tokens, and credentials for OpenClaw on Kubernetes using Kubernetes Secrets, External Secrets Operator, and Sealed Secrets.

openclawsecretssecurityapi-keys
advanced ⏱ 15 minutes

OpenShift ACS for Kubernetes

Deploy and configure Red Hat Advanced Cluster Security (ACS/RHACS) for vulnerability scanning, compliance, network policies, and runtime threat detection.

openshiftacsrhacsstackrox
intermediate ⏱ 25 minutes

Filter CatalogSource Operators by Package

Curate a minimal CatalogSource with only approved operators using opm index pruning and file-based catalog filtering for security and compliance.

catalogsourceolmoperatorssecurity
intermediate ⏱ 20 minutes

OpenShift Cluster-Wide Pull Secret with Robot Account

Replace admin credentials in the OpenShift cluster-wide pull secret with a Quay robot account for secure, auditable container image pulls across all namespaces.

openshiftquaypull-secretsecurity
intermediate ⏱ 15 minutes

OpenShift Custom CA for Private Registries

Configure OpenShift to trust a custom Certificate Authority for private container registries using additionalTrustedCA and image.config.openshift.io settings.

openshiftcertificatestlscontainer-registry
intermediate ⏱ 15 minutes

RHACS Compliance Scanning

Run CIS, NIST, PCI DSS, and HIPAA compliance scans with Red Hat Advanced Cluster Security and automate reporting for audits.

openshiftacsrhacscompliance
advanced ⏱ 15 minutes

RHACS Custom System Policies

Create and manage custom security policies in Red Hat Advanced Cluster Security for image scanning, deployment config, and runtime enforcement.

openshiftacsrhacsstackrox
advanced ⏱ 15 minutes

RHACS Multi-Cluster Management

Manage security across multiple Kubernetes clusters with RHACS Central hub, secured cluster registration, and unified policy enforcement.

openshiftacsrhacsmulti-cluster
advanced ⏱ 15 minutes

RHACS Network Segmentation Policies

Use Red Hat Advanced Cluster Security network graph to discover traffic flows, generate NetworkPolicies, and enforce micro-segmentation.

openshiftacsrhacsnetworkpolicy
intermediate ⏱ 15 minutes

RHACS CI/CD Pipeline Integration

Integrate Red Hat Advanced Cluster Security into CI/CD pipelines with roxctl for image scanning, policy checks, and deployment validation.

openshiftacsrhacscicd
intermediate ⏱ 15 minutes

Rotate Quay Robot Tokens in Kubernetes

Automate Quay robot account token rotation across Kubernetes namespaces with zero-downtime credential updates and validation scripts.

quaysecuritysecretsrotation
advanced ⏱ 45 minutes

Update CA Certificates in Kubernetes

Rotate and update Certificate Authority (CA) certificates in Kubernetes clusters including kube-apiserver, etcd, kubelet, and custom CA bundles for TLS.

certificatescatlssecurity
intermediate ⏱ 20 minutes

SELinux and SCC Config for GPU Operator

Understand SELinux device relabeling and Security Context Constraints (SCC) requirements for the NVIDIA GPU Operator driver pods on OpenShift.

nvidiagpu-operatorselinuxscc
intermediate ⏱ 30 minutes

Deploy a New Certificate for Each OpenShift Tenant

Replace and activate new TLS certificates tenant by tenant in OpenShift IngressController deployments with verification steps and rollback guidance.

openshifttlscertificatesingresscontroller
intermediate ⏱ 20 minutes

OpenShift Multi-Tenant TLS per IngressController

Set up tenant-isolated TLS in OpenShift by assigning a dedicated certificate Secret to each IngressController for multi-tenant routing security.

openshiftmulti-tenantingresstls
intermediate ⏱ 25 minutes

Rotate OpenShift Tenant Secrets Safely

Implement low-risk secret rotation in OpenShift multi-tenant environments using versioned Secrets and controlled rollouts.

openshiftmulti-tenantsecretsrotation
advanced ⏱ 45 minutes

Secure Containers with gVisor Runtime

Enhance container isolation using gVisor sandbox runtime to add an additional security layer between containers and the host kernel for untrusted workloads

gvisorcontainer-runtimesandboxsecurity-isolation
advanced ⏱ 40 minutes

How to Integrate HashiCorp Vault with Kubernetes

Securely manage secrets with HashiCorp Vault in Kubernetes. Learn to inject secrets into pods using the Vault Agent Injector and CSI Provider.

vaultsecretssecurityhashicorp
intermediate ⏱ 45 minutes

Kyverno Policy Management and Enforcement

Implement Kubernetes-native policy management using Kyverno to validate, mutate, and generate resources with declarative policies written in YAML

kyvernopolicy-as-codeadmission-controlsecurity
advanced ⏱ 50 minutes

OIDC Authentication for Kubernetes

Configure OpenID Connect (OIDC) authentication to integrate Kubernetes with identity providers like Keycloak, Okta, Azure AD, and Google for secure user.

oidcauthenticationidentity-providersso
intermediate ⏱ 20 minutes

How to Configure Pod Security Context

Secure your Kubernetes pods with Security Context settings. Learn to set user/group IDs, file system permissions, capabilities, and privilege escalation.

security-contextsecuritypod-securitycontainers
intermediate ⏱ 25 minutes

How to Use Sealed Secrets for GitOps

Encrypt Kubernetes secrets for safe Git storage with Sealed Secrets. Learn to seal, manage, and rotate secrets in GitOps workflows securely.

sealed-secretsgitopssecurityencryption
intermediate ⏱ 30 minutes

How to Use Workload Identity for Cloud Access

Securely access cloud services from Kubernetes pods without static credentials. Configure Workload Identity for AWS, Azure, and GCP with IRSA, Workload.

workload-identityiamcloud-securityirsa
advanced ⏱ 15 minutes

How to Create Admission Webhooks

Build validating and mutating admission webhooks to enforce policies and modify resources. Implement custom admission controllers for Kubernetes.

admission-webhookssecurityvalidationmutation
advanced ⏱ 15 minutes

How to Configure Kubernetes API Access Control

Set up secure API server access with authentication and authorization. Configure RBAC, API groups, and audit logging for cluster security.

api-serverauthenticationauthorizationrbac
intermediate ⏱ 15 minutes

How to Manage Kubernetes Certificates with cert-manager

Automate TLS certificate management with cert-manager. Configure issuers, request certificates from Let's Encrypt, and enable automatic renewal.

cert-managertlscertificateslets-encrypt
intermediate ⏱ 15 minutes

How to Scan Container Images for Vulnerabilities

Implement container image vulnerability scanning with Trivy, Grype, and other tools. Integrate scanning into CI/CD pipelines and admission control.

securityvulnerability-scanningtrivycontainers
intermediate ⏱ 15 minutes

How to Implement Container Security Scanning

Scan container images for vulnerabilities before deployment. Integrate Trivy and other tools into CI/CD pipelines and runtime admission control.

securityscanningvulnerabilitiestrivy
intermediate ⏱ 15 minutes

How to Use External Secrets Operator

Sync secrets from external providers like AWS Secrets Manager, HashiCorp Vault, and Azure Key Vault into Kubernetes using External Secrets Operator.

secretsexternal-secretsvaultaws
advanced ⏱ 15 minutes

How to Configure Kubernetes Audit Logging

Enable and configure Kubernetes API audit logging. Track who did what, when, and to which resources for security compliance and troubleshooting.

auditloggingsecuritycompliance
advanced ⏱ 15 minutes

How to Use Kubernetes RuntimeClass

Configure different container runtimes for workloads. Use gVisor, Kata Containers, or other runtimes for enhanced security and isolation.

runtimeclassgvisorkatacontainers
intermediate ⏱ 15 minutes

How to Implement Kyverno Policies

Enforce Kubernetes policies with Kyverno. Validate, mutate, and generate resources using declarative YAML policies without code.

kyvernopolicysecurityadmission-control
advanced ⏱ 15 minutes

How to Implement Advanced NetworkPolicies

Master advanced Kubernetes NetworkPolicies for fine-grained traffic control. Learn egress rules, CIDR blocks, namespace isolation, and common security.

networkpolicysecuritynetworkingisolation
intermediate ⏱ 15 minutes

How to Configure Pod Security Admission

Enforce security standards with Pod Security Admission. Configure privileged, baseline, and restricted policies at namespace level for cluster-wide.

pod-securitypsasecuritypolicies
advanced ⏱ 15 minutes

How to Encrypt Secrets at Rest with KMS

Configure Kubernetes secrets encryption at rest using external KMS providers. Learn to set up AWS KMS, GCP KMS, and Azure Key Vault encryption.

encryptionkmssecretssecurity
intermediate ⏱ 15 minutes

How to Manage Kubernetes Secrets Securely

Best practices for managing secrets in Kubernetes. Learn encryption at rest, secret rotation, and integration with external secret stores.

secretssecurityencryptionbest-practices
intermediate ⏱ 15 minutes

How to Configure Service Accounts and RBAC

Secure your Kubernetes workloads with service accounts and role-based access control. Create roles, bindings, and implement least-privilege access.

rbacservice-accountssecurityauthorization
intermediate ⏱ 25 minutes

How to Implement Pod Security Standards

Secure your Kubernetes workloads using Pod Security Standards (PSS). Learn to enforce Privileged, Baseline, and Restricted policies at the namespace level.

securitypod-securitypsspsa
intermediate ⏱ 30 minutes

How to Configure RBAC and Service Accounts

Master Kubernetes RBAC (Role-Based Access Control) to secure your cluster. Learn to create Roles, ClusterRoles, and bind them to ServiceAccounts.

rbacsecurityservice-accountrole
Luca Berton Ansible Pilot Ansible by Example Open Empower K8s Recipes Terraform Pilot CopyPasteLearn ProteinLens