Security considerations for Kubernetes
You must make sure that the Kubernetes cluster is secured according to network policies.
Network policy
Make sure that the Kubernetes cluster where you plan to install is configured securely. To help
harden the security for your cluster, you can consider implementing a restrictive ingress and egress
network policy that strictly controls the inbound and outbound traffic, but allows the applications
within the namespace to communicate with each other.
- For general information about network policies in Kubernetes, see https://kubernetes.io/docs/concepts/services-networking/network-policies/.
- For Red Hat OpenShift specific information about creating your ingress and egress network policy, see Red Hat documentation: Creating a network policy.