The presentation discusses the challenges of implementing Pod Security Admission in real-world scenarios and provides solutions to address them.
- Pod Security Admission is a security feature that replaces pod security policies.
- The main challenge with implementing Pod Security Admission is that workloads often require privileges to run, which defeats the purpose of the feature.
- To address this, the speaker suggests breaking down services into separate component parts and locking down everything else.
- The principle of least privilege does not mean zero privilege, so a node with minimal value can be used to welcome exploited privileges.
- The presentation provides an overview of the challenges and pitfalls of implementing Pod Security Admission and offers guidelines to develop applications using PSA.
The speaker explains that if privileges are not given to a workload that needs them, strange things can happen. For example, the workload may not even be created, or it may crash in a loop. However, if privileges are given to everything, it defeats the purpose of Pod Security Admission. The solution is to give privileges at first and then start curtailing them to optimize security.