Call for round the year submissions for Rootconf in 2020

Submit a proposal at any time in the year on DevOps, infrastructure security, cloud, and distributed systems. We will find you a suitable opportunity to share your work.

Securing your Kubernetes Cluster from potential Threats

Submitted by saurabh gupta (@gupta-saurabh) on Tuesday, 30 April 2019

Section: Crisp talk Technical level: Intermediate Session type: Lecture Status: Submitted


Kubernetes is currently the most popular container orchestration engine of choice, but its security is debatable. There are some vulnerabilities that have already been discovered in Kubernetes and Docker. The question that arises is what are the potential risks of these vulnerabilities to the application/business, and how we can go about fixing these.

The talk will also cover what are some of the best security practices that should be followed while designing and implementing Kubernetes within an organisation.


The outline of the talk would be roughly as follows:
1. How vulnerable is your Kubernetes cluster.
2. Past known vulnerabilities in Kubernetes and their potential Risks.
3. How to fix these known vulnerabilities.
4. Security Best Practises to be followed while designing a Kubernetes cluster .


Basic knowledge of Kubernetes,Container technologies is expected. This session will focus on real world security threats associated with Kubernetes and how we can follow some best practises to make our Kubernetes clusters more secure.

Speaker bio

Saurabh Gupta is a Cloud and Devops professional with over a decade of experience into development, devops ,cloud automation, build and release, monitoring and container technology. He is currently associated with DigitalOcean as a Sr.Developer Advocate.



  • saurabh gupta (@gupta-saurabh) Proposer a year ago

    I had a look at talk on “Using Pod Security Policies to harden your Kubernetes cluster”: 

    This talk is very focused on Kubernetes security using ‘Pod Security Policies’ where Suraj explains what Pod Security Policy is and how it can help in hardening the cluster. 

    Whereas my talk is covering a more broader horizon of Kuberneets Security and talks about recent security issues in K8s, how to fix these potential threats and finally security best practises to follow while designing Kubernetes cluster, one of these practises being “Pod Security Policy”.

    My talk in a way, talks much more in-depth about various security aspects of Kuberenets and suggests best practises to fix , which caters to larger Kubernetes user community and not focusing on a single single security best practise.

    • Zainab Bawa (@zainabbawa) 11 months ago

      Thanks for the clarification, Saurabh. We will close the decision on this in a day’s time.

Login to leave a comment