Hardening Your Kubernetes Cluster - Threat Model - GitGuardian Blog
The NSA and CISA recently released a guide on Kubernetes hardening. We’ll cover this guide in a three part series. First, let’s explore the Threat Model and how it maps to K8s components.
![](https://blog.gitguardian.com/content/images/2021/10/21W31-Blog-Banner-NIST-reco-DevSecOps-Final-1.png)
Hardening Your Kubernetes Cluster - Guidelines - GitGuardian blog
In this second episode, we will go through the NSA/CISA security recommendations and explain every piece of the guidelines.
![](https://blog.gitguardian.com/content/images/2021/10/21W31-Blog-Banner-K8s-Part2-Final.png)
Kubernetes Security Tutorial: Pods
Get a deeper understanding of Kubernetes Pods security with this first tutorial.
![](https://blog.gitguardian.com/content/images/2021/12/21W41-Blog-Banner-K8s-tutorial-part1-Final.png)
Kubernetes Hardening Tutorial: Network
How to achieve Control Plane security, true resource separation with network policies, and use Kubernetes Secrets more securely.
![](https://blog.gitguardian.com/content/images/2022/01/21W41-Blog-Banner-K8s-tutorial-part2.png)
Kubernetes Hardening Tutorial Part 3: Authentication, Authorization, Logging & Auditing
Learn how to set up an AWS EKS cluster with Terraform and leverage best practices to configure roles, service accounts, logging, and auditing with useful tools.
![](https://blog.gitguardian.com/content/images/2022/02/21W06-Blog-Banner-K8s-tutorial-part3.png)