How to implement a 'shift down' approach in Kubernetes when it comes to security - Amazic
Briefly

The flexibility and extensibility of Kubernetes allow these companies to compose their own platforms by selecting best-in-class projects from the CNCF and other sources.
For instance, policies could range from basic security measures (e.g., restricting root user access in pods) to broader compliance requirements (e.g., following NSA Kubernetes hardening guidelines or NIST 850-53 standards).
Read at Amazic
[
add
]
[
|
|
]