K8S occupies a dominant position in the container orchestration market, and more and more enterprises adopt K8S clusters as the operating environment of services, and cluster security has received more attention, such as image scanning of used container images, running business containers in privileged mode, and enabling role-based access control for K8S clusters (RBAC) and other behaviors are security risks.
Submit