Kubernetes Cluster Hardening Checklist

Kubernetes Cluster Hardening Checklist

Model: GPT-4
Difficulty: Advanced
Upvotes: 0
clouddevopsKubernetessecurity

โ€” Prompt โ€”

Write a Kubernetes security hardening checklist for [cluster type/use case]. Sections: 1) Access control 2) Network policies 3) Resource limits 4) Pod security 5) Audit logging.

Why It Works

Turns best practice into action; perfect for ops, audits, and regulated industries.

Example Output

Access: RBAC. Network: Isolate namespaces. Limits: CPU/mem set. Pod: No root. Audit: Enable API server logs...