PS Product SecurityKnowledge Base

Container and Kubernetes Security

Container and Kubernetes Security

Section focus: Container and Kubernetes Security.
Best use: start with the section map below, then move into the deeper pages that match your role or stack.
Design note: this index was refreshed to act as a cleaner GitBook landing page instead of a plain directory listing.

Start with these pages

Page Why open it first
๐Ÿณ Dockerfile Security Best Practices High-value page inside Container and Kubernetes Security.
๐Ÿณ Docker Top 10 Misconfigurations High-value page inside Container and Kubernetes Security.
โ˜ธ๏ธ Kubernetes Security Baseline High-value page inside Container and Kubernetes Security.
โ˜ธ๏ธ Kubernetes Top 10 Misconfigurations High-value page inside Container and Kubernetes Security.
Network Policy Patterns High-value page inside Container and Kubernetes Security.
๐Ÿ‘ฅ Kubernetes RBAC and ABAC High-value page inside Container and Kubernetes Security.
๐Ÿ” Kubernetes API Access Hardening High-value page inside Container and Kubernetes Security.
โ˜ธ๏ธ Kubernetes Review Map โ€” CKS Domains and Modern Attack Paths Best next step when you want a curated review structure and modern attack-path shortlist.
๐Ÿ™ OPA and Policy Enforcement High-value page inside Container and Kubernetes Security.
โ˜ธ๏ธ Container / Kubernetes / Platform Security โ€” Images, Admission, RBAC, Pod Hardening, Isolation, and GitOps / Deployment Plane High-value page inside Container and Kubernetes Security.
๐Ÿงฑ Container Isolation โ€” seccomp, SELinux, AppArmor, Capabilities, gVisor, and Namespaces High-value page inside Container and Kubernetes Security.
โ˜ธ๏ธ Istio / Linkerd mTLS Operations and Certificate Rotation High-value page for mesh certificate ownership, rotation, and production pitfalls.
๐Ÿ“š Kubernetes Security Glossary and Term Map Best when the main glossary feels too broad and you need cloud-native terms in one place.

Intro: This section stays centered on the control surfaces that repeatedly shape cloud-native risk: Dockerfile design, pod security, RBAC, network segmentation, policy enforcement, and runtime investigation.

What this page includes

  • Docker and Kubernetes baselines
  • top misconfigurations
  • a CKS-aligned review map translated into real platform control ownership and modern attack paths;
  • RBAC / ABAC
  • cross-links into new runtime, identity, and attack-chain expansions

โ˜ธ๏ธ Core pages in this section

Snippets


Author attribution: Ivan Piskunov, 2026 - Educational and defensive-engineering use.