Kubernetes Security Checklist: 15 Critical Controls by NCRYPTO
Last Updated at: Nov 23, 2022
Kubernetes adoption is growing—but so are attacks targeting containerized environments. 65% of K8s deployments have critical security gaps (Red Hat, 2023). NCRYPTO’s security team has compiled this actionable checklist based on real-world breaches we’ve investigated.
Cluster Configuration Hardening
1. Authentication & Authorization
Disable anonymous authentication
|Enable RBAC with least privilege
|Enforce namespace segregation (e.g.,
devvs.prod)
2. Network Security
Apply NetworkPolicies to restrict pod-to-pod traffic
# Example: Deny all ingress by default apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: default-deny spec: podSelector: policyTypes: - IngressEncrypt etcd with TLS
Disable dashboard public access if unused
3. Workload Protections
Block privileged containers
# In PodSecurityPolicy or OPA/Gatekeeper privileged: falseSet resource limits to prevent DoS
resources: limits: cpu: "1" memory: 512MiScan images for CVEs before deployment (Trivy/Clair)
Runtime Security
4. Monitoring & Detection
Enable audit logging
Deploy runtime protection (Falco/Sysdig) to detect:
- Shells in containers (
kubectl execabuse) - Cryptominer patterns
- Writable hostPath mounts
- Shells in containers (
5. Secrets Management
Never store secrets in manifests
Use external secrets managers (Vault/Secrets Manager)
Rotate service account tokens quarterly
Compliance & Governance
6. CIS Benchmark Enforcement
Check kubelet arguments:
| | # Must include --anonymous-auth=false --read-only-port=0Enable PodSecurityPolicy/PSA (or OPA/Gatekeeper)
7. Backup & Recovery
- Test etcd backups monthly
- Validate disaster recovery with chaos engineering (e.g., kill random nodes)
Advanced Protections
8. Service Mesh Security (Istio/Linkerd)
- Enforce mTLS between services
- Apply service-level authorization
9. Supply Chain Security
- Sign container images (Cosign/Sigstore)
- Scan Helm charts for malicious templates
NCRYPTO’s Kubernetes Security Services
Beyond checklists, we offer:
✅ Automated K8s Hardening – Enforce controls via GitOps
✅ 24/7 Runtime Protection – Detect zero-day container escapes
✅ Compliance Reporting – Pre-built for PCI-DSS, HIPAA, SOC 2
📅 Free Cluster Assessment: Get a personalized risk report in 48 hours.