<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Enterprise Kubernetes Method Modification at S&amp;P 500 Companies⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleh Faizulin</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mariia Nazarkevych</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Stepan Bandera str., 79000 Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>56</fpage>
      <lpage>69</lpage>
      <abstract>
        <p>Kubernetes has become the backbone of modern enterprise application architectures, offering unmatched scalability and flexibility. However, operating Kubernetes securely at the scale of an S&amp;P 500 company introduces unique challenges. This paper explores typical challenges, including, but not limited to, multicluster management, CI/CD pipeline security, and insider threats, while presenting best practices and tools to mitigate risks. It also discusses experimental insights, lessons learned from real-world S&amp;P 500 deployments, and emerging trends like zero-trust architecture and AI-driven threat detection. By combining technical expertise and practical strategies, enterprises can confidently scale Kubernetes while maintaining robust security postures.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Kubernetes security</kwd>
        <kwd>enterprise Kubernetes</kwd>
        <kwd>S&amp;P 500</kwd>
        <kwd>multi-cluster management</kwd>
        <kwd>CI/CD security</kwd>
        <kwd>container vulnerabilities</kwd>
        <kwd>zero-trust architecture</kwd>
        <kwd>AI-driven threat detection</kwd>
        <kwd>compliance</kwd>
        <kwd>DevOps security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>2. Kubernetes security challenges at scale</title>
      <p>Operating Kubernetes on the enterprise scale, particularly within S&amp;P 500 companies, presents a
host of security challenges that require robust and innovative strategies to address. Below, we
explore some of the most pressing issues and provide insights into their potential impact.</p>
      <sec id="sec-2-1">
        <title>2.1. Multi-cluster management</title>
        <p>
          Enterprises often operate multiple Kubernetes clusters across environments such as production,
staging, and development. Managing these clusters at scale involves ensuring consistent security
policies and configurations across diverse environments. Misconfigurations in one cluster can
potentially expose sensitive workloads or create gaps that attackers may exploit. Studies such as
Haque et al. [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. highlight the risks of misconfigured orchestrator settings in multi-cluster setups.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. CI/CD pipeline security</title>
        <p>
          Kubernetes thrives in environments with automated CI/CD pipelines, but these pipelines can also
be a significant attack vector. Compromised CI/CD workflows can lead to the injection of malicious
code into container images or clusters. Tools like Trivy and Clair are crucial for image vulnerability
scanning, but their effectiveness depends on enterprise-wide adoption and integration [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Container image vulnerabilities</title>
        <p>
          Containers provide portability and efficiency, but they also introduce risks related to outdated or
unverified images. Public container registries can inadvertently harbor images with known
vulnerabilities. Enterprises need to implement strict policies for image scanning and verification, as
described in Red Hat’s [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] findings on container vulnerability management.
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>2.4. Misconfigurations</title>
        <p>
          One of the most common challenges in Kubernetes security is misconfigurations, such as overly
permissive Role-Based Access Control (RBAC) policies, lack of resource quotas, and unbounded
service accounts. Studies like Islam Shamim et al. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] identify misconfigurations as the leading
cause of Kubernetes security breaches. Automated tools like Kyverno and OPA/Gatekeeper help
enforce security policies to mitigate these risks.
        </p>
      </sec>
      <sec id="sec-2-5">
        <title>2.5. Insider threats and supply chain attacks</title>
        <p>
          Insider threats, whether intentional or accidental, pose a unique challenge. Employees with
excessive privileges can inadvertently expose critical data or systems. Similarly, supply chain
attacks, such as the injection of malicious dependencies, have become increasingly prevalent.
Reports from SentinelOne [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] emphasize the importance of detecting anomalies and unauthorized
access patterns as part of an overall defense strategy.
        </p>
      </sec>
      <sec id="sec-2-6">
        <title>2.6. Compliance with regulatory standards</title>
        <p>
          S&amp;P 500 companies operate under strict regulatory environments, including SOC 2, GDPR, and
HIPAA. Ensuring compliance across distributed Kubernetes environments requires continuous
monitoring, audit trails, and adherence to security benchmarks provided by cloud providers like
Google Cloud [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] and Microsoft Azure [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-7">
        <title>2.7. Evolving threat landscape</title>
        <p>
          The evolving nature of cybersecurity threats requires proactive and creative security approaches.
AI/ML-driven anomaly detection and predictive analytics, as suggested by Malul et al. [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], are
becoming integral to identifying and mitigating zero-day vulnerabilities and advanced persistent
threats in Kubernetes clusters.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Kubernetes security method</title>
      <sec id="sec-3-1">
        <title>3.1. Network security</title>
        <p>
          Securing Kubernetes network communications is foundational for protecting enterprise clusters.
Implementing service meshes like Istio or Linkerd provides fine-grained control over traffic flows,
including encryption, authentication, and policy enforcement. Service meshes also enable detailed
observability, which is critical for detecting and mitigating attacks. Kubernetes network policies
allow administrators to define rules restricting traffic between pods or namespaces, reducing the
risk of lateral movement during attacks. According to recent studies, such as Song et al. [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ],
integrating service meshes with Kubernetes-native policies significantly improves overall network
security in multi-tenant environments. Additionally, integrating firewalls and external security
tools helps secure traffic entering and leaving the cluster. Recent studies, such as Liu et al. [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ],
emphasize the importance of enhancing network observability and minimizing trust boundaries
using advanced network security policies.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Identity and access management</title>
        <p>Effective Identity and access management (IAM) ensures that users, applications, and services have
access only to the resources necessary for their functions. Role-Based Access Control (RBAC) is
central to Kubernetes IAM, allowing administrators to grant specific permissions to users and
service accounts. Best practices include:


</p>
        <sec id="sec-3-2-1">
          <title>Using the principle of least privilege to restrict access.</title>
          <p>Segmenting clusters for multi-tenancy to isolate workloads.</p>
          <p>Enforcing multi-factor authentication (MFA) for user logins.</p>
          <p>
            Recent studies, such as those by Liu et al. [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ], highlight that fine-grained RBAC policies
combined with MFA implementation significantly mitigate unauthorized access risks in Kubernetes
environments. Similarly, underscore the importance of auditing IAM configurations regularly to
ensure compliance and security. According to Ali et al. [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ], fine-grained IAM controls reduce the
attack surface and provide actionable insights for compliance and auditing.
          </p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Data security</title>
        <p>
          Kubernetes stores sensitive data such as configuration secrets, API keys, and certificates.
Encrypting data at rest and in transit is vital to prevent unauthorized access. Secrets management
tools, like HashiCorp Vault or Kubernetes-native solutions, enable secure storage and rotation of
credentials. Implementing volume encryption for persistent storage ensures compliance with data
protection standards like GDPR and HIPAA. Haque et al. [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] suggest that integrating data
encryption with identity-aware proxies further strengthens Kubernetes data security frameworks.
        </p>
      </sec>
      <sec id="sec-3-4">
        <title>3.4. Continuous monitoring and runtime security</title>
        <p>
          Real-time monitoring of Kubernetes environments allows for early detection of security incidents.
Tools like Falco and Sysdig monitor runtime activities, flagging suspicious behavior, such as
unauthorized container access or unexpected privilege escalations. Additionally, integrating these
tools with centralized logging systems (e.g., ELK stack or Splunk) enhances threat investigation and
response capabilities. Recent advancements, such as runtime analysis features in tools like Tracee,
provide deeper insights into container and workload behavior, enabling enterprises to detect
zeroday vulnerabilities and other sophisticated threats more effectively. Malul et al. [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] argue that
runtime monitoring combined with predictive analytics can proactively prevent container-based
vulnerabilities.
        </p>
      </sec>
      <sec id="sec-3-5">
        <title>3.5. Compliance and auditing</title>
        <p>
          Meeting regulatory requirements is crucial for enterprises. Kubernetes security frameworks, like
CIS Benchmarks, provide detailed guidelines for configuration and compliance checks. Audit logs
should capture all cluster activities, including API requests, user authentication, and resource
changes. Enterprises can leverage tools such as Kubescape and Aqua Security to automate
compliance checks and generate audit reports, simplifying adherence to standards like SOC 2 and
PCI DSS. References like Check Point [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] highlight the increasing adoption of automated
compliance management solutions in large-scale deployments.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Building an enterprise-grade secure Kubernetes infrastructure</title>
      <p>Operating Kubernetes securely at the enterprise level requires a multifaceted approach that
addresses infrastructure, tools, and workflows. This chapter outlines strategies for building a
robust, scalable, and secure Kubernetes infrastructure suitable for S&amp;P 500 companies.</p>
      <sec id="sec-4-1">
        <title>4.1. Managed vs. on-premises Kubernetes</title>
        <p>Enterprises face a critical decision between adopting managed Kubernetes services, like AWS EKS,
Google Kubernetes Engine (GKE), or Azure Kubernetes Service (AKS), and deploying on-premises
Kubernetes clusters. Managed services simplify operations with automated updates, scaling, and
integrated cloud-native tools. However, they can limit control over security configurations and
customization.</p>
        <p>
          Conversely, on-premises Kubernetes offers unparalleled control, enabling organizations to
implement tailored security measures, particularly for regulated industries. However, this requires
a higher level of expertise, operational overhead, and resource commitment. Hybrid models, which
combine managed and on-premises clusters, are increasingly popular for balancing flexibility with
operational efficiency, as highlighted in Haque et al. [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Centralized identity and access management</title>
        <p>As enterprises scale their Kubernetes deployments, centralized identity and access management
(IAM) becomes vital. Disparate IAM systems across clusters can lead to inconsistent access controls
and increased attack surfaces. Key practices include:


</p>
        <p>Unified Authentication: Leveraging single sign-on (SSO) systems, such as Okta or Azure
AD, ensures consistent authentication mechanisms across all clusters. Integrating these
with Kubernetes-native tools like kube-oidc-proxy enables seamless authentication
workflows.</p>
        <p>Granular RBAC Policies: Centralizing the management of RBAC policies across clusters
prevents privilege escalation and ensures adherence to the principle of least privilege.
Auditing and Logging: Regular audits of IAM configurations and continuous monitoring of
authentication logs help detect anomalies, such as unauthorized access attempts.</p>
        <p>
          Studies such as [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] and [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] emphasize that centralized IAM systems reduce security
management overhead in large enterprises.
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. GitOps and policy enforcement</title>
        <p>GitOps frameworks, like ArgoCD and Flux, have become cornerstones of enterprise Kubernetes
management. By treating infrastructure as code, GitOps ensures that configuration changes are
declarative, version-controlled, and auditable. Enterprises can rapidly recover from
misconfigurations and maintain consistent cluster states across environments.</p>
        <p>
          Integrating policy enforcement tools such as Open Policy Agent (OPA) and Kyverno within
GitOps pipelines enhances security by automatically validating configurations against predefined
policies before deployment. Liu et al. [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] emphasize that combining GitOps with policy
enforcement significantly reduces human errors and configuration drift, enabling compliance and
security consistency [
          <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. GitOps and policy enforcement</title>
        <p>The dynamic nature of Kubernetes environments necessitates the use of specialized tools to address
security aspects. Kubernetes-native tools like Trivy, Falco, and Kyverno tackle specific areas:


</p>
        <p>Trivy: Scans container images, repositories, and Infrastructure-as-Code (IaC) files for
vulnerabilities.</p>
        <p>Falco: Monitors runtime system calls for suspicious activity, such as privilege escalations.</p>
        <p>Kyverno: Enforces policy compliance, including RBAC rules and network policies.</p>
        <p>Integrating these tools into CI/CD pipelines and runtime monitoring workflows provides a
layered approach to security. Recent advancements in tools like Falco’s integration with eBPF have
enhanced runtime observability.</p>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. High availability and disaster recovery</title>
        <p>
          Enterprise-grade Kubernetes infrastructures must be resilient against failures and disasters. High
availability (HA) involves deploying control plane nodes and worker nodes across multiple
availability zones to ensure continuous operation during outages. Managed services like GKE and
EKS provide out-of-the-box HA setups, but on-premises environments require manual
configuration of load balancers, etcd clusters, and backup solutions [
          <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
          ].
        </p>
        <p>
          Disaster recovery strategies should include regular backups of etcd, container images, and
application data. Tools like Velero facilitate automated backup and restore processes for
Kubernetes resources. Incorporating multi-region failover mechanisms further strengthens an
organization’s disaster recovery posture [
          <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-6">
        <title>4.6. Secure development lifecycle in Kubernetes</title>
        <p>Security in Kubernetes starts during the development phase. Implementing a Secure Development
Lifecycle (SDLC) that integrates security checks early in the CI/CD pipeline minimizes
vulnerabilities. Practices include:</p>
        <p>Code Scanning: Tools like SonarQube identify insecure coding patterns.</p>
        <p>Image Scanning: Solutions like Trivy detects vulnerabilities in base images.</p>
        <p>Policy as Code: Embedding security policies in configuration files ensures adherence to
organizational standards.</p>
        <p>
          Developers should also receive regular training on container security best practices. Studies like
[
          <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
          ] indicate that container security and threat detection are key components of enterprise
Kubernetes security.
        </p>
      </sec>
      <sec id="sec-4-7">
        <title>4.7. Zero trust architecture in Kubernetes</title>
        <p>Zero Trust Architecture (ZTA) has emerged as a critical paradigm for securing modern Kubernetes
environments. ZTA operates on the principle of “never trust, always verify,” ensuring that no
entity—whether inside or outside the network—is inherently trusted.</p>
        <p>In Kubernetes, ZTA implementation includes:





</p>
        <p>Strong Authentication: Using multi-factor authentication (MFA) and short-lived certificates
for API server access.</p>
        <p>Microsegmentation: Isolating workloads at the pod level using network policies and service
meshes like Istio.</p>
        <p>
          Continuous Verification: Monitoring access and actions in real-time using tools like OPA.
Recent research, including Ali et al. [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], demonstrates the effectiveness of ZTA in reducing attack
surfaces and mitigating lateral movement within clusters [
          <xref ref-type="bibr" rid="ref19 ref20">19, 20</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-8">
        <title>4.8. Multi-cluster observability and threat detection</title>
        <p>
          Observability and threat detection become increasingly complex in multi-cluster environments [
          <xref ref-type="bibr" rid="ref21 ref22">21,
22</xref>
          ]. Enterprises must invest in centralized monitoring and real-time threat detection to ensure
security at scale.
        </p>
        <p>
          Centralized Logging and Metrics: Platforms like Prometheus, Grafana, and Loki enable the
aggregation of logs and metrics across clusters. Combining these tools with centralized
SIEM solutions, such as Splunk or Elastic Security, provides actionable insights into
security events [
          <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
          ].
        </p>
        <p>
          AI-Driven Threat Detection: Machine learning models can analyze patterns in logs to detect
anomalies and potential threats. For example, tools like ThreatMapper leverage AI to
identify and prioritize vulnerabilities in Kubernetes workloads [
          <xref ref-type="bibr" rid="ref25 ref26">25, 26</xref>
          ].
        </p>
        <p>Incident Response Automation: Integrating security orchestration, automation, and
response (SOAR) platforms with Kubernetes environments enables rapid mitigation of
security incidents.</p>
        <sec id="sec-4-8-1">
          <title>Execution:</title>
        </sec>
        <sec id="sec-4-8-2">
          <title>Expected Outcome:</title>
          <p>

</p>
          <p>Enable Kubernetes’ Validating Admission Webhook feature.</p>
          <p>Deploy an image policy webhook, such as Portieris, to validate image signatures and
enforce policies.</p>
          <p>Configure policies to allow images only from signed and verified registries, such as Docker
Hub or private repositories.</p>
          <p>Attempt to deploy an unsigned or untrusted image and observe the rejection by the
admission controller.</p>
          <p>Deploy a signed image from a trusted source and verify its acceptance.






</p>
        </sec>
        <sec id="sec-4-8-3">
          <title>Only signed images from trusted registries are permitted.</title>
          <p>Rejections are logged with detailed reasons for audit purposes.</p>
          <p>
            Research by Malul et al. [
            <xref ref-type="bibr" rid="ref2">2</xref>
            ] demonstrates that enterprises employing AI-driven threat detection
reduce incident response times by 45%.
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Experiments</title>
      <p>Experiments play a critical role in evaluating and refining Kubernetes security mechanisms. This
chapter outlines practical experiments designed to enhance cluster security by implementing
advanced configurations and observing their impact in controlled environments. Each experiment
is grounded in best practices and supported by real-life Kubernetes deployment scenarios.</p>
      <sec id="sec-5-1">
        <title>5.1. Deploying images only from trusted sources</title>
        <p>Ensuring that only trusted container images are deployed is fundamental to maintaining a secure
Kubernetes environment. This experiment involves configuring admission controllers to enforce
image source validation.</p>
        <p>Setup:</p>
      </sec>
      <sec id="sec-5-2">
        <title>5.2. Dropping unnecessary container capabilities</title>
        <p>By default, containers run with a broad set of Linux capabilities, many of which are unnecessary
and pose security risks. This experiment focuses on enforcing policies to drop all unnecessary
capabilities for every workload.</p>
        <p>Setup:</p>
        <p>Deploy a Kubernetes PodSecurityPolicy (PSP) or its successor, Pod Security Admission, to
enforce dropping all capabilities by default using the Drop: [“ALL”] directive.</p>
        <p>Create a validating webhook to reject any pod definition that does not explicitly drop all
capabilities.</p>
        <p>Attempt to deploy a pod without specifying Drop: ALL in the securityContext and verify it
is rejected.</p>
        <p>Deploy a compliant pod with Drop: ALL and test its functionality.</p>
        <p>Expected Outcome:

</p>
        <p>Only pods explicitly dropping all capabilities are successfully deployed.</p>
        <p>Logs and webhook responses provide clear feedback on rejected attempts.</p>
      </sec>
      <sec id="sec-5-3">
        <title>5.3. Enforcing rootless mode</title>
        <p>Running containers as non-root users significantly mitigates the impact of potential container
breakouts. Containers operating with root privileges inherently pose a risk because a vulnerability
within the containerized application could be exploited to gain access to the host system or escalate
privileges within the cluster. By enforcing rootless mode, organizations can limit the damage
caused by such exploits, as non-root containers lack the administrative privileges required to
perform critical actions on the host. This experiment demonstrates the configuration and benefits
of enforcing rootless mode for workloads by strictly prohibiting deployments with runAsNonRoot
set to false. It also emphasizes the importance of explicitly defining runAsUser and runAsGroup
fields to ensure that workloads are running under specific, non-root identities. Such configurations
provide an additional layer of security by mapping the container’s user and group IDs to restricted
permissions, effectively adhering to the principle of least privilege. By validating these settings
during deployment, Kubernetes administrators can ensure that even if a containerized application
is compromised, the attack surface remains minimal.</p>
        <p>Setup:



</p>
        <sec id="sec-5-3-1">
          <title>Analyze SLAM algorithms, their advantages and disadvantages. Create a Kubernetes admission controller webhook to enforce security contexts requiring:</title>
          <p>○ runAsNonRoot set to true.
○ runAsUser and runAsGroup explicitly defined.</p>
          <p>Update Kubernetes manifests to reflect these requirements in their securityContext.
Configure the cluster’s Pod Security Standards (PSS) to disallow any pods without a
properly configured securityContext.


</p>
          <p>Attempt to deploy a pod with runAsNonRoot set to false and verify that it is rejected.
Deploy a pod with runAsNonRoot: true, specify runAsUser: 1000 and runAsGroup: 1000,
and ensure it functions as expected.</p>
          <p>Simulate potential security breaches, such as attempting privilege escalations, and
observing the cluster's responses.</p>
          <p>Pods without runAsNonRoot: true or missing runAsUser/runAsGroup are rejected at
deployment.</p>
          <p>Workloads run with non-root privileges and adhere to the principle of least privilege.
Logs and monitoring tools confirm enforcement and capture rejection details.</p>
        </sec>
      </sec>
      <sec id="sec-5-4">
        <title>5.4. Enforcing read-only root filesystem</title>
        <p>Ensuring that containers operate with a read-only root filesystem is a critical measure to minimize
the impact of potential exploits. By restricting the filesystem to read-only mode, administrators can
prevent attackers from modifying or overwriting files within the container, which is a common
tactic used to escalate privileges, install malicious software, or exfiltrate sensitive data. This
approach aligns with the principle of immutability, where containers are treated as static artifacts
that should not change after deployment. This experiment demonstrates how to enforce the
readOnlyRootFilesystem setting to prevent unauthorized modifications to container filesystems. By
doing so, organizations can ensure that even if an application vulnerability is exploited, the
attacker is unable to persist changes or disrupt critical container operations. Additionally, the
enforcement of a read-only filesystem reduces the attack surface, as it limits writable paths and
ensures that application dependencies, configurations, and binaries remain intact and secure.</p>
        <p>Update the securityContext of your pod specifications to include readOnlyRootFilesystem:
true.</p>
        <p>Implement a validating admission webhook to enforce the use of readOnlyRootFilesystem
across all workloads in the cluster.</p>
        <p>Use Kubernetes Pod Security Standards (PSS) to define and enforce policies disallowing
writable root filesystems.</p>
        <p>Attempt to deploy a pod without readOnlyRootFilesystem: false and observe the rejection
by the webhook or policy enforcement.</p>
        <p>Deploy a pod with the readOnlyRootFilesystem setting enabled and validate its
functionality by attempting to write to the root filesystem.


</p>
        <p>Simulate a potential attack scenario, such as injecting malicious scripts, and observe the
system’s inability to persist these changes.</p>
        <sec id="sec-5-4-1">
          <title>Expected Outcome: Pods without readOnlyRootFilesystem: true are rejected at deployment. Workloads operate with immutable root filesystems, ensuring unauthorized changes cannot be made.</title>
          <p>Logs and monitoring tools capture details of policy violations and deployment rejections.</p>
        </sec>
      </sec>
      <sec id="sec-5-5">
        <title>5.5. Limiting resource usage</title>
        <p>Limiting resource usage is a fundamental practice in maintaining a stable and secure Kubernetes
cluster, especially in multi-tenant environments. Resource constraints help prevent a single
workload from monopolizing CPU or memory resources, which could otherwise lead to Denial of
Service (DoS) scenarios or adversely impact the performance of other workloads. These constraints
also protect against malicious actors or misconfigured applications that might attempt to
overwhelm cluster resources, either intentionally or unintentionally. By enforcing resource limits,
Kubernetes administrators can ensure a fair and predictable allocation of resources across all
deployed applications, promoting better overall cluster performance and stability. This experiment
explores the practical steps to configure and monitor resource quotas and limits effectively. It
highlights how resource limits can act as a safeguard against cascading failures by isolating
resource-intensive workloads and ensuring that other services remain unaffected.</p>
        <p>Setup:</p>
        <p>Define resource quotas and limits in the namespace using ResourceQuota objects.
Set resource requests and limits for individual pods in the resources section of their
manifests.</p>
        <p>Execution:</p>
        <sec id="sec-5-5-1">
          <title>Expected Outcome:</title>
          <p>
</p>
        </sec>
        <sec id="sec-5-5-2">
          <title>Deploy workloads with and without resource constraints. Simulate resource-intensive operations and observe the impact on cluster performance. Pods exceeding their allocated resources are throttled or evicted, preventing disruption to other workloads.</title>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>Kubernetes has revolutionized the way organizations deploy and manage applications, offering
unparalleled scalability and flexibility. However, its adoption at scale introduces complex security
challenges that demand thoughtful solutions and proactive measures. This paper has explored the
multifaceted landscape of Kubernetes security, from identifying challenges to implementing key
security pillars and designing practical experiments to validate these measures.</p>
      <p>The critical challenges highlighted include ensuring secure configurations, mitigating risks
associated with insider threats and supply chain attacks, and maintaining robust runtime security.
The key pillars of Kubernetes security, such as identity and access management, network policy
enforcement, workload isolation, and observability, provide a comprehensive framework for
addressing these challenges. Practical experiments detailed in this work, such as enforcing image
provenance, dropping unnecessary container capabilities, and implementing runtime security tools,
offer actionable steps for organizations to strengthen their Kubernetes environments.</p>
      <p>As Kubernetes continues to evolve, so do the threats targeting its ecosystems. Organizations
must remain vigilant and adaptable, leveraging the latest tools, practices, and research to safeguard
their infrastructure. Future work in Kubernetes security should focus on emerging technologies
like service meshes, advanced threat detection mechanisms, and automated policy enforcement
driven by machine learning.</p>
      <p>By adopting a holistic and experimental approach to Kubernetes security, organizations can not
only secure their clusters but also build a culture of continuous improvement and resilience. In an
era where cybersecurity threats are ever-present, the insights and strategies discussed in this paper
serve as a foundation for enterprises striving to achieve robust, scalable, and secure Kubernetes
deployments.</p>
      <p>Declaration on Generative AI
While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
             U. 
            <surname>Haque</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
             M. 
            <surname>Kholoosi</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
           A. 
          <article-title>Babar, Kgsecconfig: A knowledge graph based approach for secured container orchestrator configuration</article-title>
          ,
          <source>in: IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)</source>
          ,
          <year>2022</year>
          ,
          <fpage>420</fpage>
          -
          <lpage>431</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>E.</given-names>
             
            <surname>Malul</surname>
          </string-name>
          , et al.,
          <article-title>GenKubeSec: LLM-based Kubernetes misconfiguration detection, localization, reasoning, and remediation</article-title>
          . arXiv,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.2405.19954
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Red</given-names>
            <surname>Hat</surname>
          </string-name>
          .
          <source>The State of Kubernetes Security in</source>
          <year>2024</year>
          ,
          <year>2024</year>
          . URL: https://www.redhat.com/ en/blog/state-kubernetes-security
          <article-title>-2024</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M. S. I.</given-names>
             
            <surname>Shamim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
             A. 
            <surname>Bhuiyan</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
           
          <article-title>Rahman, XI Commandments of Kubernetes security: A systematization of knowledge related to Kubernetes security practices</article-title>
          ,
          <source>in: IEEE Secure Development (SecDev)</source>
          ,
          <year>2020</year>
          ,
          <fpage>58</fpage>
          -
          <lpage>64</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5] SentinelOne, Kubernetes security companies in
          <year>2025</year>
          ,
          <year>2025</year>
          . URL: https://www.sentinelone.com/cybersecurity-101/cloud-security/kubernetes-securitycompanies/
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Google</given-names>
            <surname>Cloud</surname>
          </string-name>
          ,
          <article-title>GKE security overview</article-title>
          . URL: https://cloud.google.com/kubernetes-engine/ docs/concepts/security-overview
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Microsoft</surname>
          </string-name>
          ,
          <article-title>Azure security baseline for Azure Kubernetes service</article-title>
          (AKS),
          <year>2023</year>
          . URL: https://learn.microsoft.com/en-us/security/benchmark/azure/baselines/azure-kubernetesservice
          <article-title>-aks-security-baseline</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>E.</given-names>
             
            <surname>Song</surname>
          </string-name>
          , et al.,
          <article-title>Canal mesh: A cloud-scale sidecar-free multi-tenant service mesh architecture</article-title>
          ,
          <source>in: Proceedings of the ACM SIGCOMM 2024 Conference</source>
          ,
          <year>2024</year>
          ,
          <fpage>860</fpage>
          -
          <lpage>875</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>C.</given-names>
             
            <surname>Liu</surname>
          </string-name>
          , et al.,
          <article-title>A protocol-independent container network observability analysis system based on eBPF</article-title>
          ,
          <source>in: IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS)</source>
          ,
          <year>2020</year>
          ,
          <fpage>697</fpage>
          -
          <lpage>702</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Ali</surname>
          </string-name>
          , et al.,
          <article-title>Implementation of new security features in CMSWEB Kubernetes Cluster at CERN</article-title>
          ,
          <source>in: EPJ Web of Conferences</source>
          , vol.
          <volume>295</volume>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Check</surname>
            <given-names>Point</given-names>
          </string-name>
          ,
          <source>Kubernetes security: Challenges and best practices</source>
          ,
          <year>2023</year>
          . URL: https://www.checkpoint.com/cyber-hub/
          <article-title>cloud-security/what-is-kubernetes/kubernetes-k8ssecurity/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>M. </surname>
          </string-name>
          <article-title>Gupta, Deployment of identity and access management solutions (IAM) using DevOps environment</article-title>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>S. </surname>
          </string-name>
          <article-title>Yi, Secure IAM on AWS with multi-account strategy</article-title>
          . arXiv,
          <year>2025</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.2501.02203
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Eldjou</surname>
          </string-name>
          , et al.,
          <article-title>Enhancing container runtime security: A case study in threat detection</article-title>
          ,
          <source>in: Tunisian-Algerian Joint Conference on Applied Computing</source>
          , vol.
          <volume>3642</volume>
          ,
          <year>2023</year>
          ,
          <fpage>55</fpage>
          -
          <lpage>69</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Poniszewska-Marańda</surname>
          </string-name>
          ,
          <string-name>
            <surname>E.</surname>
          </string-name>
           Czechowska,
          <article-title>Kubernetes cluster for automating software production environment</article-title>
          ,
          <source>Sensors</source>
          ,
          <volume>21</volume>
          (
          <issue>5</issue>
          ) (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>I.</surname>
          </string-name>
           Dronjuk,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Nazarkevych</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.</surname>
          </string-name>
           
          <article-title>Troyan, The modified amplitude-modulated screening technology for the high printing quality</article-title>
          ,
          <source>in: International Symposium on Computer and Information Sciences</source>
          ,
          <year>2016</year>
          ,
          <fpage>270</fpage>
          -
          <lpage>276</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -47217-1_
          <fpage>29</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>K.</given-names>
             
            <surname>Senjab</surname>
          </string-name>
          , et al.,
          <article-title>A survey of Kubernetes scheduling algorithms</article-title>
          ,
          <source>J. Cloud Comput</source>
          .
          <volume>12</volume>
          (
          <issue>1</issue>
          ) (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Hrytsyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Nazarkevych</surname>
          </string-name>
          ,
          <article-title>Real-time sensing, reasoning and adaptation for computer vision systems</article-title>
          ,
          <source>in: Lecture Notes in Computational Intelligence and Decision Making: 2021 International Scientific Conference, Intellectual Systems of Decision-making and Problems of Computational Intelligence</source>
          , vol.
          <volume>77</volume>
          ,
          <year>2022</year>
          ,
          <fpage>573</fpage>
          -
          <lpage>585</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>P.</given-names>
             
            <surname>Skladannyi</surname>
          </string-name>
          , et al.,
          <article-title>Improving the security policy of the distance learning system based on the zero trust concept</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>97</fpage>
          -
          <lpage>106</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>R. </given-names>
            <surname>Syrotynskyi</surname>
          </string-name>
          , et al.,
          <article-title>Methodology of network infrastructure analysis as part of migration to zero-trust architecture</article-title>
          ,
          <source>in: Cyber Security and Data Protection</source>
          , vol.
          <volume>3800</volume>
          (
          <year>2024</year>
          )
          <fpage>97</fpage>
          -
          <lpage>105</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Z.</given-names>
             
            <surname>Rejiba</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
           Chamanara,
          <article-title>Custom scheduling in Kubernetes: A survey on common problems and solution approaches</article-title>
          ,
          <source>ACM Comput. Surv</source>
          .
          <volume>55</volume>
          (
          <issue>7</issue>
          ), (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>I.</surname>
          </string-name>
           Dronyuk,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Nazarkevych</surname>
          </string-name>
          ,
          <string-name>
            <surname>Z.</surname>
          </string-name>
           Poplavska,
          <article-title>Gabor filters generalization based on atebfunctions for information security</article-title>
          ,
          <source>in: International Conference on Man-Machine Interactions</source>
          ,
          <year>2017</year>
          ,
          <fpage>195</fpage>
          -
          <lpage>206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
             
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <string-name>
            <surname>N.</surname>
          </string-name>
           
          <article-title>Korshun, ZigBee Network resistance to jamming attacks</article-title>
          ,
          <source>in: IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo)</source>
          ,
          <year>2023</year>
          ,
          <fpage>161</fpage>
          -
          <lpage>165</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
             
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
           
          <article-title>Platonenko, Jump-stay jamming attack on Wi-Fi systems</article-title>
          ,
          <source>in: IEEE 18th International Conference on Computer Science and Information Technologies (CSIT)</source>
          ,
          <year>2023</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Senkivskyy</surname>
          </string-name>
          , et al.,
          <article-title>Modeling of alternatives and defining the best options for websites design</article-title>
          ,
          <source>in: 2nd International Workshop on Intelligent Information Technologies and Systems of Information Security</source>
          , vol.
          <volume>2853</volume>
          ,
          <year>2021</year>
          ,
          <fpage>259</fpage>
          -
          <lpage>270</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <source>[26] I. </source>
          <string-name>
            <surname>Tsmots</surname>
          </string-name>
          , et al.,
          <article-title>Intelligent motion control system for the mobile robotic platform</article-title>
          ,
          <source>in: 7 th International Conference on Computational Linguistics and Intelligent Systems</source>
          , vol.
          <volume>3403</volume>
          ,
          <year>2023</year>
          ,
          <fpage>555</fpage>
          -
          <lpage>569</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>