Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Workload/Pod/Container Hardening:

  1. Protecting workload secrets Secrets. Secrets could be injected in the workloads using volume mounts, environment vars, etc. Provide clear guidelines and specific tooling to secure such secrets.
  2. Protecting sensitive assets mounted using volume mount points

...

  1. Workload Process Monitoring
  2. Workload Sensitive Asset access
  3. External Network exposure for workloads
  4. Ability to query forensics details for a specified time duration from past X days.

Other Topics:

  1. Leveraging Confidential Computing for hardware based protections

charisse lu Should we create security guidelines for workload creators?

...