Session
Beyond RBAC: Kubernetes Security in Practice
Most Kubernetes security talks stop where the real work starts. RBAC, namespaces, network policies, pod security standards are useful, but anyone running clusters in production knows that is the table of contents, not the answer.
This session is a live walkthrough of what a hardened Kubernetes platform actually looks like once attackers, auditors, and reality have had a go at it. We will run through realistic threat scenarios on stage: where the supply chain breaks (images, Helm charts, operators you forgot you installed), how secrets really leak, what your detection actually catches and what it quietly misses, and what disaster recovery looks like when the cluster itself is compromised. I will show the failure cases, not just the happy path.
Most of what I will show comes from running the Kubernetes platform we have been operating for our own customers for about ten years. Some of the patterns are ones we got right early. Others we changed our minds about after an incident or an audit told us we were wrong.
If you already know the basics of Kubernetes security and want to see what running a platform for the long run actually demands, this session is for you.
Ronald Harmsen
Senior engineer. 25+ years in production. Software that still works in ten years.
Arnhem, The Netherlands
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top