{"id":953,"date":"2019-03-29T10:00:45","date_gmt":"2019-03-29T04:30:45","guid":{"rendered":"https:\/\/www.urolime.com\/blogs\/uk\/?p=953"},"modified":"2019-03-31T20:57:20","modified_gmt":"2019-03-31T15:27:20","slug":"practices-for-protecting-kubernetes","status":"publish","type":"post","link":"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/","title":{"rendered":"Practices for Protecting Kubernetes"},"content":{"rendered":"\n<p>This year, 2019 is typically a good start for Kubernetes. With the launch of its new version 1.14, Kubernetes has introduced newer features such as the production-level support for Windows nodes and a process that defines how and when the enhancements are accepted and move through the Kubernetes development cycle. In the current scenario, Kubernetes is the current de facto standard for container orchestration.<br><\/p>\n\n\n\n<p>The popularity and demand for containers are increasing and many organisations are adopting lightweight containers than the resource intensive virtual machines. The rate of Kubernetes adoption was doubled in 2018. Even though Kubernetes was successful and had many advantages, a security hole in the form of a privilege-escalation flaw was discovered which allowed hackers to exploit it.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Security Flaw<br><\/h2>\n\n\n\n<p>The first major security hole in Kubernetes was discovered in early November 2018. The bug was termed as <a href=\"https:\/\/github.com\/kubernetes\/kubernetes\/issues\/71411\">CVE-2018-1002105<\/a>, also known as the Kubernetes privilege escalation flaw. The bug allowed the attacker to gain full administrator privileges on various Kubernetes compute nodes. The flaw was rated 9.8 out of 10 which is critical, according to the Common Vulnerabilities Scoring System (CVSS).<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Practices<br><\/h2>\n\n\n\n<p>No cloud-based platform can be termed as 100 per cent secure, issues can happen at any time. It only matters how the issues are resolved with proper security measures and prevent further issues in the future. In the case of Kubernetes, with the discovery of the privilege-escalation flaw, it cannot be termed as completely secure. Kubernetes was originally developed by Google before being a part of the CNCF<g class=\"gr_ gr_27 gr-alert gr_gramm gr_inline_cards gr_run_anim Style replaceWithoutSep\" id=\"27\" data-gr-id=\"27\">.<\/g><\/p>\n\n\n\n<p>The thing is that cloud services usually operate on a shared responsibility model. The Cloud service platform is responsible for managing the security of the cloud, and the organization that uses the cloud service is usually responsible for implementing security in it. By following certain practices, it can manage the security of Kubernetes and protect the cloud containers.<\/p>\n\n\n\n<p><br><\/p>\n\n\n\n<p><strong>Updating to the latest version<\/strong><\/p>\n\n\n\n<p>The security flaw in Kubernetes was eventually resolved by updating Kubernetes to the latest version by using patches. To stay secure in the current scenario of vulnerabilities, it is always recommended to update to the latest version. Typically patches and security fixes are released on a periodic basis. <br><\/p>\n\n\n\n<p><strong>Know your Kubernetes clusters<\/strong><\/p>\n\n\n\n<p>Usually, when workloads increases, clusters will have to be deployed to handle, however, when more and more clusters are deployed, it will lead to cluster sprawl. It is always recommended to know what clusters are used for managing workloads by using discovery tools offered by the cloud service provider.<br><\/p>\n\n\n\n<p><strong>Security and Compliance<\/strong><br><\/p>\n\n\n\n<p>Securing the cloud is not the same as securing an on-premise environment. Similarly for containers, securing containers is also not the same as securing a non-container system. Even though Kubernetes manages multiple container orchestration, the container environments are still complex, dynamic. With the discovery of new threats and vulnerabilities, managing security is not an easy task, therefore, the organizations must ensure that the container configurations and security controls have adhered to applicable compliance requirements.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About Us<\/h2>\n\n\n\n<p>Urolime is one of the leading DevOps consulting company with considerable experience in supporting customers around the globe in adopting DevOps practices. As an AWS and Cloud consulting partner, Urolime not only has experience in Cloud Migrations but also support the vast customer base to enable scalable and highly available architecture on AWS, Azure, and GCP. The customers benefit from our expert involvement in Deployment Automation (CI\/CD), Infrastructure Automation, Dockerization, Security, Disaster Recovery Planning &amp; Implementation and 24\/7 Managed Services with 10 Minutes SLA. Urolime is one of the companies which deals with a bunch of Kubernetes solution build for the customer on AWS, Azure, and GCP.<\/p>\n\n\n\n<p><br><\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_953\" class=\"pvc_stats all  \" data-element-id=\"953\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>This year, 2019 is typically a good start for Kubernetes. With the launch of its new version 1.14, Kubernetes has introduced newer features such as the production-level support for Windows nodes and a process that defines how and when the enhancements are accepted and move through the Kubernetes development cycle. In the current scenario, Kubernetes [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_953\" class=\"pvc_stats all  \" data-element-id=\"953\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":954,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[36],"tags":[180,199,39,40,43,44],"class_list":["post-953","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kubernetes","tag-cloud-computing","tag-it-managed-services","tag-kubernetes","tag-kubernetes-consulting","tag-kubernetes-security-best-practices","tag-kubernetes-security-issues"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Practices for Protecting Kubernetes - Urolime Blogs<\/title>\n<meta name=\"description\" content=\"Kubernetes is definitely the de facto standard for container orchestration, however, it is also subjected to vulnerabilities. By following proper security measures, the vulnerabilities can be eliminated. Click to know more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Practices for Protecting Kubernetes - Urolime Blogs\" \/>\n<meta property=\"og:description\" content=\"Kubernetes is definitely the de facto standard for container orchestration, however, it is also subjected to vulnerabilities. By following proper security measures, the vulnerabilities can be eliminated. Click to know more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/\" \/>\n<meta property=\"og:site_name\" content=\"Urolime Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-29T04:30:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-31T15:27:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/Practices-for-Protecting-Kubernetes.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1240\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Urolime Technologies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Urolime Technologies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/\"},\"author\":{\"name\":\"Urolime Technologies\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\"},\"headline\":\"Practices for Protecting Kubernetes\",\"datePublished\":\"2019-03-29T04:30:45+00:00\",\"dateModified\":\"2019-03-31T15:27:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/\"},\"wordCount\":602,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/Practices-for-Protecting-Kubernetes.png\",\"keywords\":[\"cloud computing\",\"it managed services\",\"kubernetes\",\"kubernetes consulting\",\"kubernetes security best practices\",\"kubernetes security issues\"],\"articleSection\":[\"Kubernetes\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/\",\"name\":\"Practices for Protecting Kubernetes - Urolime Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/Practices-for-Protecting-Kubernetes.png\",\"datePublished\":\"2019-03-29T04:30:45+00:00\",\"dateModified\":\"2019-03-31T15:27:20+00:00\",\"description\":\"Kubernetes is definitely the de facto standard for container orchestration, however, it is also subjected to vulnerabilities. By following proper security measures, the vulnerabilities can be eliminated. Click to know more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#primaryimage\",\"url\":\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/Practices-for-Protecting-Kubernetes.png\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/Practices-for-Protecting-Kubernetes.png\",\"width\":1240,\"height\":700,\"caption\":\"Practices for Protecting Kubernetes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.urolime.com\/blogs\/uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Practices for Protecting Kubernetes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#website\",\"url\":\"https:\/\/www.urolime.com\/blogs\/uk\/\",\"name\":\"Urolime Blogs\",\"description\":\"The place for DevOps, Cloud, Kubernetes News and Updates\",\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.urolime.com\/blogs\/uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#organization\",\"name\":\"Urolime Blogs\",\"url\":\"https:\/\/www.urolime.com\/blogs\/uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2021\/06\/cropped-250-x250.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2021\/06\/cropped-250-x250.jpg\",\"width\":250,\"height\":73,\"caption\":\"Urolime Blogs\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\",\"name\":\"Urolime Technologies\",\"description\":\"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.\",\"sameAs\":[\"https:\/\/www.urolime.com\/\"],\"url\":\"https:\/\/www.urolime.com\/blogs\/uk\/author\/blogadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Practices for Protecting Kubernetes - Urolime Blogs","description":"Kubernetes is definitely the de facto standard for container orchestration, however, it is also subjected to vulnerabilities. By following proper security measures, the vulnerabilities can be eliminated. Click to know more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/","og_locale":"en_US","og_type":"article","og_title":"Practices for Protecting Kubernetes - Urolime Blogs","og_description":"Kubernetes is definitely the de facto standard for container orchestration, however, it is also subjected to vulnerabilities. By following proper security measures, the vulnerabilities can be eliminated. Click to know more.","og_url":"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/","og_site_name":"Urolime Blogs","article_published_time":"2019-03-29T04:30:45+00:00","article_modified_time":"2019-03-31T15:27:20+00:00","og_image":[{"width":1240,"height":700,"url":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/Practices-for-Protecting-Kubernetes.png","type":"image\/png"}],"author":"Urolime Technologies","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Urolime Technologies","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#article","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/"},"author":{"name":"Urolime Technologies","@id":"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c"},"headline":"Practices for Protecting Kubernetes","datePublished":"2019-03-29T04:30:45+00:00","dateModified":"2019-03-31T15:27:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/"},"wordCount":602,"commentCount":0,"publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/#organization"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/Practices-for-Protecting-Kubernetes.png","keywords":["cloud computing","it managed services","kubernetes","kubernetes consulting","kubernetes security best practices","kubernetes security issues"],"articleSection":["Kubernetes"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/","url":"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/","name":"Practices for Protecting Kubernetes - Urolime Blogs","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#primaryimage"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/Practices-for-Protecting-Kubernetes.png","datePublished":"2019-03-29T04:30:45+00:00","dateModified":"2019-03-31T15:27:20+00:00","description":"Kubernetes is definitely the de facto standard for container orchestration, however, it is also subjected to vulnerabilities. By following proper security measures, the vulnerabilities can be eliminated. Click to know more.","breadcrumb":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#primaryimage","url":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/Practices-for-Protecting-Kubernetes.png","contentUrl":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/Practices-for-Protecting-Kubernetes.png","width":1240,"height":700,"caption":"Practices for Protecting Kubernetes"},{"@type":"BreadcrumbList","@id":"https:\/\/www.urolime.com\/blogs\/uk\/practices-for-protecting-kubernetes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.urolime.com\/blogs\/uk\/"},{"@type":"ListItem","position":2,"name":"Practices for Protecting Kubernetes"}]},{"@type":"WebSite","@id":"https:\/\/www.urolime.com\/blogs\/uk\/#website","url":"https:\/\/www.urolime.com\/blogs\/uk\/","name":"Urolime Blogs","description":"The place for DevOps, Cloud, Kubernetes News and Updates","publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.urolime.com\/blogs\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.urolime.com\/blogs\/uk\/#organization","name":"Urolime Blogs","url":"https:\/\/www.urolime.com\/blogs\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2021\/06\/cropped-250-x250.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2021\/06\/cropped-250-x250.jpg","width":250,"height":73,"caption":"Urolime Blogs"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c","name":"Urolime Technologies","description":"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.","sameAs":["https:\/\/www.urolime.com\/"],"url":"https:\/\/www.urolime.com\/blogs\/uk\/author\/blogadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/posts\/953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/comments?post=953"}],"version-history":[{"count":4,"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/posts\/953\/revisions"}],"predecessor-version":[{"id":958,"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/posts\/953\/revisions\/958"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/media\/954"}],"wp:attachment":[{"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/media?parent=953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/categories?post=953"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/tags?post=953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}