K8s Preventing Privileged Pods using Pod Security Admission / Standards

Samos123 · Beginner ·📰 AI News & Updates ·3y ago
Prevent privileged pods from being created to improve security of your K8s cluster. This video shows how to do this using Pod Security Admission/Standards through a fun hands-on screenshare with explanations. Blog post: https://samos-it.com/posts/Preventing-Privileged-pods-using-Pod-Security-Admission-Standards.html Content 0:00 Introduction 1:42 Background on Pod Security Standards and Admission 2:43 Enforcing Baseline Pod Security Standard on default namespace 4:28 Verify privileged pods are being blocked In a Kubernetes cluster, a privileged pod is a pod that has been given extended permissions beyond the default set of permissions. These extended permissions can include the ability to access the host's network, devices, and other sensitive resources. While privileged pods can be useful in certain situations, they also present a significant security risk. In this video, you will learn how to prevent privileged pods using Pod Security Admission and applying Pod Security Standards. Note that using Pod Security Policy (another method to prevent privileged pods) has been deprecated in 1.23 and removed in 1.25. So it's important you adopt Pod Security Admission / Standards instead of PSP.
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Google, Microsoft and Amazon Spent $400 Billion Buying AI Dominance
Tech giants spent $400 billion on AI acquisitions and infrastructure, reshaping the industry's approach to innovation
Dev.to AI
Beyond the Patent: The Rising Importance of Trade Secrets in the AI Era
Trade secrets are gaining importance in the AI era as a means to protect intellectual property, learn why and how to leverage them
Medium · Data Science
Beyond the Patent: The Rising Importance of Trade Secrets in the AI Era
Trade secrets are gaining importance in the AI era as a means to protect intellectual property beyond patents
Medium · Startup
After the First AI Storm, the Best Strategy Looks Surprisingly Ancient
Discover how ancient strategies can inform AI integration in the workplace, and why they matter for future success
Medium · AI

Chapters (4)

Introduction
1:42 Background on Pod Security Standards and Admission
2:43 Enforcing Baseline Pod Security Standard on default namespace
4:28 Verify privileged pods are being blocked
Up next
Highest Paying Tech Skills | Most In-Demand Skills | Tech Jobs 2026 #simplilearn #shorts
Simplilearn
Watch →