The presentation discusses how to secure Kubernetes clusters using built-in security features and open-source tools.
- Verifying signed container images
- Using package name registry.k8s.io to get all images in a release
- Running vulnerability scans with Trivy
- Enabling network policies to control traffic flow
- Using RBAC to control access to resources
- Implementing pod security policies to restrict container behavior
- Using audit logging to monitor cluster activity