-
Notifications
You must be signed in to change notification settings - Fork 60
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security recommendation/hardening guide for applications that use Kubernetes client #121
Comments
Hello, I'd like to contribute here. Just to be clear, the guide would focus on the security recommendations for applications interacting with the Kubernetes API? I can contribute in the following ways to recommend:
|
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
Is this issue resolved by PR, if yes then we can close this issue |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
/remove-lifecycle rotten |
@chadmcrowell Yes, that sounds like exactly the sort of thing we were thinking of! In general, there is a lot more security guidance for cluster administrators, but quite a bit less for folks who are writing an application to interact with their kubernetes cluster. |
Create a security recommendation/hardening guide for applications that use the Kubernetes client. This could include different use-cases like:
kubectl
commands.The text was updated successfully, but these errors were encountered: