Container Hardening Beyond Network Policies: Why the Image Matters as Much as the Network
You have implemented Kubernetes network policies. Every namespace has ingress and egress rules. Your pods can only communicate with what they are explicitly permitted to communicate with. You have done the network segmentation work. Then an attacker compromises your web application container and makes an outbound connection to an external C2 server. Your network policy…