SideroLabs 2025 | All rights reserved.
Top Trends in K8s
Security Space
Cheryl Hung, 17 Oct 2025, Amsterdam
2
oicheryl.com
Independent Previously
Sr Director, Ecosystem
at Arm
Cheryl Hung
3
4
What are your challenges when
using/deploying containers?
5
What % said security?
What are your challenges when
using/deploying containers?
6
% say
security is
a challenge
when using
containers
7
% say
security is
a challenge
when using
containers
8
% say
security is
a challenge
when using
containers
9
% say
security is
a challenge
when using
containers
10
% say
security is
a challenge
when using
containers
11
% say
security is
a challenge
when using
containers
12
Why is
security so
tricky?!
13
1. Shared responsibility leads to gaps
14
1. Shared responsibility leads to gaps
2. Misconfiguration is the killer
15
1. Shared responsibility leads to gaps
2. Misconfiguration is the killer
3. Identity is the new perimeter
16
1. Shared responsibility leads to gaps
2. Misconfiguration is the killer
3. Identity is the new perimeter
4. Speed vs security tensions
17
So what now?
18
“Shift Down”
Kubernetes
Security Paper
Published Feb 2025
19
✨ Application team
● Develop features
● Fix defects
20
✨ Application teams
● Develop features
● Fix defects
✨ Application teams
● Develop features
● Fix defects
✨ Application teams
● Develop features
● Fix defects
21
✨ Application teams
● Develop features
● Fix defects
✨ Application teams
● Develop features
● Fix defects
✨ Application teams
● Develop features
● Fix defects
🔒 Security team
● Runtime security
● Compliance
● Vulnerabilities
● Misconfigurations
● SW supply chain
22
✨ Application teams
● Develop features
● Fix defects
✨ Application teams
● Develop features
● Fix defects
✨ Application teams
● Develop features
● Fix defects
🤖 Platform team
● Self-service /
Automation
🔒 Security team
● Runtime security
● Compliance
● Vulnerabilities
● Misconfigurations
● SW supply chain
23
✨ Application teams
● Develop features
● Fix defects
✨ Application teams
● Develop features
● Fix defects
✨ Application teams
● Develop features
● Fix defects
🤖 Platform team
● Self-service / Automation
● Vulnerabilities
● Misconfigurations
● Supply chain
🔒 Security team
● Runtime security
● Compliance
● Vulnerabilities
● Misconfigurations
● SW supply chain
24
✨ Application teams
● Develop features
● Fix defects
✨ Application teams
● Develop features
● Fix defects
✨ Application teams
● Develop features
● Fix defects
🔒 Security team
● Runtime security
● Compliance
● Vulnerabilities
● Misconfigurations
● SW supply chain
🤖 Platform team
● Self-service / Automation
● Vulnerabilities: Manage base
images
● Misconfigurations
● Supply chain
25
✨ Application teams
● Develop features
● Fix defects
✨ Application teams
● Develop features
● Fix defects
✨ Application teams
● Develop features
● Fix defects
🔒 Security team
● Runtime security
● Compliance
● Vulnerabilities
● Misconfigurations
● SW supply chain
🤖 Platform team
● Self-service / Automation
● Vulnerabilities: Manage base
images
● Misconfigurations: Manage policies
● Supply chain
✨ Application teams
● Develop features
● Fix defects
✨ Application teams
● Develop features
● Fix defects
26
✨ Application teams
● Develop features
● Fix defects
🔒 Security team
● Runtime security
● Compliance
● Vulnerabilities
● Misconfigurations
● SW supply chain
🤖 Platform team
● Self-service / Automation
● Vulnerabilities: Manage base
images
● Misconfigurations: Manage policies
● Supply chain: Secure, attest, verify
✨ Application teams
● Develop features
● Fix defects
✨ Application teams
● Develop features
● Fix defects
27
✨ Application teams
● Develop features
● Fix defects
🤖 Platform team
● Self-service / Automation
● Vulnerabilities: Manage base
images
● Misconfigurations: Manage policies
● Supply chain: Secure, attest, verify
🔒 Security team
● Runtime security
● Compliance
● Vulnerabilities
● Misconfigurations
● SW supply chain
28
1. Embrace the chaos - platform team
manages common concerns
29
1. Embrace the chaos - platform team
manages common concerns
2. Automate trust - Policy as Code
30
1. Embrace the chaos - platform team
manages common concerns
2. Automate trust - Policy as Code
3. Less is more - complements Shift Left,
but reduces developer overhead
31
github.com/kubernetes/sig-se
curity/blob/main/sig-security-d
ocs/papers/shift-down/shift-do
wn-security.md
Thank you
32
oicheryl.com

Top Trends in Kubernetes Security: TalosCon 2025

  • 1.
    SideroLabs 2025 |All rights reserved. Top Trends in K8s Security Space Cheryl Hung, 17 Oct 2025, Amsterdam
  • 2.
  • 3.
  • 4.
    4 What are yourchallenges when using/deploying containers?
  • 5.
    5 What % saidsecurity? What are your challenges when using/deploying containers?
  • 6.
    6 % say security is achallenge when using containers
  • 7.
    7 % say security is achallenge when using containers
  • 8.
    8 % say security is achallenge when using containers
  • 9.
    9 % say security is achallenge when using containers
  • 10.
    10 % say security is achallenge when using containers
  • 11.
    11 % say security is achallenge when using containers
  • 12.
  • 13.
  • 14.
    14 1. Shared responsibilityleads to gaps 2. Misconfiguration is the killer
  • 15.
    15 1. Shared responsibilityleads to gaps 2. Misconfiguration is the killer 3. Identity is the new perimeter
  • 16.
    16 1. Shared responsibilityleads to gaps 2. Misconfiguration is the killer 3. Identity is the new perimeter 4. Speed vs security tensions
  • 17.
  • 18.
  • 19.
    19 ✨ Application team ●Develop features ● Fix defects
  • 20.
    20 ✨ Application teams ●Develop features ● Fix defects ✨ Application teams ● Develop features ● Fix defects ✨ Application teams ● Develop features ● Fix defects
  • 21.
    21 ✨ Application teams ●Develop features ● Fix defects ✨ Application teams ● Develop features ● Fix defects ✨ Application teams ● Develop features ● Fix defects 🔒 Security team ● Runtime security ● Compliance ● Vulnerabilities ● Misconfigurations ● SW supply chain
  • 22.
    22 ✨ Application teams ●Develop features ● Fix defects ✨ Application teams ● Develop features ● Fix defects ✨ Application teams ● Develop features ● Fix defects 🤖 Platform team ● Self-service / Automation 🔒 Security team ● Runtime security ● Compliance ● Vulnerabilities ● Misconfigurations ● SW supply chain
  • 23.
    23 ✨ Application teams ●Develop features ● Fix defects ✨ Application teams ● Develop features ● Fix defects ✨ Application teams ● Develop features ● Fix defects 🤖 Platform team ● Self-service / Automation ● Vulnerabilities ● Misconfigurations ● Supply chain 🔒 Security team ● Runtime security ● Compliance ● Vulnerabilities ● Misconfigurations ● SW supply chain
  • 24.
    24 ✨ Application teams ●Develop features ● Fix defects ✨ Application teams ● Develop features ● Fix defects ✨ Application teams ● Develop features ● Fix defects 🔒 Security team ● Runtime security ● Compliance ● Vulnerabilities ● Misconfigurations ● SW supply chain 🤖 Platform team ● Self-service / Automation ● Vulnerabilities: Manage base images ● Misconfigurations ● Supply chain
  • 25.
    25 ✨ Application teams ●Develop features ● Fix defects ✨ Application teams ● Develop features ● Fix defects ✨ Application teams ● Develop features ● Fix defects 🔒 Security team ● Runtime security ● Compliance ● Vulnerabilities ● Misconfigurations ● SW supply chain 🤖 Platform team ● Self-service / Automation ● Vulnerabilities: Manage base images ● Misconfigurations: Manage policies ● Supply chain
  • 26.
    ✨ Application teams ●Develop features ● Fix defects ✨ Application teams ● Develop features ● Fix defects 26 ✨ Application teams ● Develop features ● Fix defects 🔒 Security team ● Runtime security ● Compliance ● Vulnerabilities ● Misconfigurations ● SW supply chain 🤖 Platform team ● Self-service / Automation ● Vulnerabilities: Manage base images ● Misconfigurations: Manage policies ● Supply chain: Secure, attest, verify
  • 27.
    ✨ Application teams ●Develop features ● Fix defects ✨ Application teams ● Develop features ● Fix defects 27 ✨ Application teams ● Develop features ● Fix defects 🤖 Platform team ● Self-service / Automation ● Vulnerabilities: Manage base images ● Misconfigurations: Manage policies ● Supply chain: Secure, attest, verify 🔒 Security team ● Runtime security ● Compliance ● Vulnerabilities ● Misconfigurations ● SW supply chain
  • 28.
    28 1. Embrace thechaos - platform team manages common concerns
  • 29.
    29 1. Embrace thechaos - platform team manages common concerns 2. Automate trust - Policy as Code
  • 30.
    30 1. Embrace thechaos - platform team manages common concerns 2. Automate trust - Policy as Code 3. Less is more - complements Shift Left, but reduces developer overhead
  • 31.
  • 32.

Editor's Notes

  • #13 Shared responsibility leads to complexity and visibility gaps The biggest source of trouble is that cloud providers secure the infrastructure, but you're responsible for what you put on it. Many organizations don't realize they still own securing their data, applications, access controls, and configurations. This blurred line leads to dangerous assumptions about what's actually protected. Traditional security tools were built for networks you control. In the cloud, your resources are abstracted away, spread across regions, and constantly changing. You often can't see what's running, who has access, or where your data actually lives. Shadow IT makes this worse—teams spin up services without security's knowledge.
  • #14 Cloud platforms are incredibly flexible, which means there are countless ways to configure them incorrectly. An S3 bucket left publicly readable, overly permissive IAM roles, unencrypted databases—these mistakes are easy to make and hard to detect at scale. Most major breaches involve misconfiguration rather than sophisticated attacks.
  • #15 Your network boundary dissolved when you moved to the cloud. Now security hinges entirely on identity and access management, which is notoriously difficult to get right across multiple platforms, services, and user types. Credential compromise becomes catastrophic.
  • #16 Cloud enables rapid deployment, but security reviews can't always keep pace. DevOps teams prioritize velocity, and security is often an afterthought or a blocker to be worked around. Shift left = Too much expectations on developers, overload
  • #18 How many people have heard of Shift Down vs Shift Left?
  • #24 Deliver minimal and hardened images to application teams, removing unnecessary packages and dependencies that could introduce vulnerabilities.. Plus scanning can be done during the CI/CD pipeline
  • #25 Cloud native Policy as Code (PaC) solution, that provides flexibility, reporting and visibility. version control and two-person code reviews.
  • #26 Sign container images, and verify provenance and integrity of these images prior to deployment, using Policy as Code solutions that integrate with admission controls.
  • #27 Development can focus on their core tasks. Security establish organizational standards and SLAs, monitor for compliance, approve exceptions
  • #31 Who does some of these? All?