A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly ingest data from on-prem, cloud or hybrid environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Identity Security
    • Singularity Identity
      Identity Threat Detection and Response
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-class Expertise and Threat Intelligence.
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive solutions for seamless security operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your go-to source for our top partners in your region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
Background image for Kubernetes Security Checklist for 2025
Cybersecurity 101/Cloud Security/Kubernetes Security Checklist

Kubernetes Security Checklist for 2025

Follow a comprehensive security checklist to ensure your cluster is locked down, including network policies, secret management, and role-based access control, to prevent breaches and maintain compliance in your Kubernetes environment.

CS-101_Cloud.svg
Table of Contents

Related Articles

  • Infrastructure as a Service: Benefit, Challenges & Use Cases
  • What is Cloud Forensics?
  • Cloud Security Strategy: Key Pillars for Protecting Data and Workloads in the Cloud
  • Cloud Threat Detection & Defense: Advanced Methods 2025
Author: SentinelOne
Updated: August 4, 2025

Cyber threats are constantly emerging, and malicious actors need more time to prepare for them. Optimizing Kubernetes security is critical to improving a company’s cloud security posture. Kubernetes administrators must understand how the infrastructure works to incorporate effective security measures.

The Kubernetes Security Checklist for 2025 can be broadly classified into three categories:

  • Clusters
  • Pods
  • Containers

Kubernetes Security Checklist needs to be simplified, and operational complexity must be addressed. When organizations try to prioritize security measures and remediate threats, they automatically boost business reputations. Businesses build trust among customers and establish credibility. It also reduces operational expenses by preparing for future issues that may emerge later with increasing threats.

 Let’s dive into that.

Multiple Components Kubernetes Security Checklist

The Kubernetes Security Checklist has multiple components-

  • Auditing and logging
  • Network security
  • Authentication and authorization
  • Secrets management
  • Admission control
  • Kubernetes security boundaries
  • Kubernetes security policies
  • Kubelet security
  • Open’ defaults

According to the Kubernetes adoption, security, and market trends report 2024, organizations have documented numerous adverse impacts (including revenue losses and fines) due to negligence in Kubernetes container security. DevSecOps teams have stated that vulnerabilities and misconfigurations are the top security concerns associated with Kubernetes and container environments. Open-source Kubernetes software solutions are unsafe and affect software supply chain security. Over 67% of companies have delayed business operations due to security issues, and most global firms are overwhelmed with all aspects of security management, starting from development, deployment, and maintenance. 

The ultimate Kubernetes security checklist for 2025

#1. Follow CIS Benchmarks

CIS Benchmarks provide baseline security policies that organizations can use to improve Kubernetes security. It safeguards IT systems from cyber-attacks and features a set of community consensus processes and guidelines developed to secure Kubernetes environments. According to the Kubernetes security checklist CIS Benchmark, the top components users need to secure are – Kubernetes PKI, kubeadm, CNI files, etcd data directory, kubeadm admin.conf, controller manager.conf, and the pod specification file.

#2. Kubernetes API Authentication

One of the most widely adopted methods of Kubernetes API authentication in the Kubernetes security checklist is using X509 certificates. Certificates are used to highlight a group of memberships and can verify the names of subjects who send requests.

According to the Kubernetes security checklist, other built-in methods exist for authenticating user accounts. Kubernetes authentication practices validate the identity of users and determine whether or not they should be granted access. Role-based access control is implemented in the process.

For using X509 authentication, users need to create a private key and issue a certificate signing request. This can be initiated in Unix or similar operating system environments. The second most popular technique of Kubernetes authentication is using OpenID Connect (OIDC) tokens. Many OIDC providers like Google, Okta, dex, and OpenUnison help with this. Various single sign-on services assist with Kubernetes API authentication, and the implementation steps vary depending on the service users choose. Service account authentication tokens can be used to validate authentication requests, and bearer tokens in HTTP headers can also issue recommendations.

The final method of authentication is the use of static password files. It is the least secure authentication approach but the easiest. It requires minimal configuration, and users must manually update the password file to update user access changes. For those new to Kubernetes authentication, using static password files as an authentication solution is the most straightforward approach for use with test clusters.

#3. Kubelet Security

Kubelet security entails running nodes across Kubernetes clusters. It is primarily responsible for managing Kubernetes containers directly on the nodes and interacts with container runtime interfaces (CRI).

There are two ports involved: 10255 and 10250. 10255 is a read-only port that returns data about pods and containers running on nodes. 10250 is a writable port that can schedule pods on selected nodes.

When deploying Kubernetes clusters for the first time, the following security measures should be considered as part of the Kubernetes security checklist:

  • Execute nodes on internal networks always
  • Use kubelet using the –anonymous-auth=false flag and restrict anonymous access
  • Avoid setting the authorization mode to AlwaysAllow and select something else
  • Restrict kubelets permissions. The NodeRestriction admission plugin can modify pods and bind them to Node objects.
  • Use certificate-based authentication and properly configure it to enable communications between master and nodes smoothly.
  • Apply strict firewall rules and only enable the Kubernetes master to communicate with the kubelet
  • Turn off read-only ports and restrict information shared by workloads
  • Test all Kubernetes security controls manually and ensure that kubelets are inaccessible by default

#4. Secrets Management

Kubernetes secrets store sensitive data like API keys, passwords, and tokens. Kubernetes secrets are meant not to be accessible by internal Kubernetes components and are only sent to pod nodes on a need-to-know basis. Secrets are one of the biggest targets for attackers and must be guarded carefully.

Users should restrict access to etcd, control it, and apply encryption to etcd clusters. Kubernetes containers should also follow the principle of least privilege access. Node authorization should be implemented among other Kubernetes security checklist items. Ideally, users should use different sets of secrets for different Kubernetes environments.

It is a good practice to avoid building secrets into images. Enabling real-time scanning of secrets across source code repositories and verifying them is also recommended. Secrets are at risk of being written to logs, and one of the best security practices is to pass secrets in files. Set the mounted volume as a temporary directory instead of writing to the disk. You can also rotate secret keys, choose different ways to store them and pass them to containers for the best results. Sometimes, applications need to be restarted to read new database passwords. For file-based workflow users, file secrets can be updated automatically without restarts.

#5. Admission Controllers

Admission controllers are included in the Kubernetes security checklist for 2025. These enforce Kubernetes security policy frameworks and work as a second line of defense next to RBAC controls.

Admission controllers can set rules based on different parameters and limit resource utilization. They can prevent the execution of commands in privileged containers and always require pods to pull images instead of using locally stored ones at the node. Another benefit of admission controllers is monitoring incoming requests and setting resource constraints in namespaces. It is recommended that users enable the default admission controllers provided by Kubernetes as a bare minimum.

#6. Kubernetes Security Boundaries

Kubernetes security boundaries form the foundation of the Kubernetes security checklist. It prevents processes from accessing other users’ data and enforces policies that offer containerized isolation. The LimitRanger and ResourceQuota admission templates inhibit resource deprivation, and as for the pods, users can define customized security contexts and enforce them.

#7. Kubernetes Security Policies

Pod security standards are subject to varying degrees of complexity. Kubernetes pod security policies are configured on a cluster-level resource and enforce the usage of security contexts and admission controllers. The pod has to meet the requirements of the pod security policy, or else it won’t run. Pod security policies are automatically removed from Kubernetes v1.25 and up, meaning users must migrate to the Kubernetes Pod Security admission controller.

Security contexts define access control settings and privileges for Kubernetes containers. It implements discretionary access controls, sets permissions for accessing objects based on group IDs, and configures unprivileged processes.

Users can define internal security context tools and integrate them with external features. They can use the seccomp to filter system calls, and AppArmor can restrict the capabilities of individual components. You don’t need to provide access privileges and assign resource-specific permissions, helping you take a granular approach. Users can include security contexts with the Security context code found within deployment files when creating pods. Kubernetes is very agile, and users can also automate profile deployment across nodes. The only downside is that there is no support for Windows containers. They can also enable permissions to secure service accounts, nodes, and users.

#8. Kubernetes Network Security

Kubernetes Network security is an essential component of the Kubernetes security checklist. It adds controls that specify how traffic flows between containers and defines the type of traffic meant to be blocked. Users can follow a multi-cluster architecture to isolate workloads and mitigate security issues by deploying workloads in different clusters. You can achieve a high degree of container isolation and reduce complexity simultaneously.

There are Kubernetes network policies that add firewalling capabilities and restrict traffic flow between pods. It specifies which pods communicate with selected network entities. The ingress policy is allowed on the destination port, and the egress policy must be on the source pod to enable optimal traffic flow. As a general rule, using labels is good, and users can add procedures to permit and direct traffic to only where they expect it. They can restrict traffic to specific ports for different applications. Kubernetes service meshes can simplify monitoring and provide various features related to continuous monitoring and alerts. They detect security threats and report incidents; many service mesh projects are available. Kubernetes security checklist suggests using options such as Linkerd, Consul, and Istio.

#9. Kubernetes Auditing and Logging

Maintaining container event logs and creating an audit trail for production environments is essential. Kubernetes audit logging includes logging the identity of images and users who invoke start and stop commands. CNI plugins generate virtual network interfaces used by containers. CNI plugins also integrate with several third-party configuration management platforms and tools, and the most popular ones are Cilium and Project Calico. Other aspects of Kubernetes auditing and logging include the modification of container payloads and volume mounts, monitoring inbound and outbound connections, and remediating failed actions. Application logging is the easiest way to monitor cluster activity and can give insights for debugging applications. Implementing cluster-level logging and push logs in storage containers is a standard practice using a centralized log management platform or service.

Why SentinelOne for Kubernetes Security?

SentinelOne’s Cloud Workload Security (CWS) for Kubernetes, part of the Singularity™ platform, offers a cutting-edge solution designed to address these modern threats effectively. Here’s how SentinelOne enhances Kubernetes security:

  • Real-Time Threat Protection: Singularity CWS continuously monitors and protects your Kubernetes workloads from threats like ransomware and unknown vulnerabilities. Its AI-driven technology ensures rapid detection and response, safeguarding your Kubernetes environments.
  • Incident Investigation and Threat Hunting: With Singularity Data Lake, SentinelOne provides comprehensive insights into your workload’s activity. This tool helps in investigating incidents and conducting threat hunts. The Workload Flight Data Recorder™ assists in recovering from incidents by removing problematic workloads, minimizing financial loss and damage.
  • Broad Compatibility: SentinelOne supports a wide array of containerized workloads, including 14 major Linux distributions, three popular container runtimes, and both managed and self-run Kubernetes services.

See SentinelOne in Action

Discover how AI-powered cloud security can protect your organization in a one-on-one demo with a SentinelOne product expert.

Get a Demo

Conclusion

The basic principles of the Kubernetes Security Checklist 2025 revolve around authentication, pod security management, secrets handling, and other components. By following these practices, organizations can secure Kubernetes environments and ensure data access is restricted. These tips simplify Kubernetes security and layer security to reduce complexities in architecture. When users optimize Kubernetes security for the cloud, it becomes easy to integrate it with other security workflows.

Kubernetes Security Checklist FAQs

A Kubernetes Security Checklist is a list of steps you follow to lock down your cluster. It covers securing the API server, etcd, and kubelet; enforcing RBAC; isolating pods with network and pod security policies; encrypting secrets; and auditing events.

The checklist serves as a guide to ensure every critical component—from control plane to workloads—meets baseline security standards.

Kubernetes clusters manage critical workloads, and any misstep can expose sensitive data or allow attackers to move laterally. A checklist prevents drift: you apply agreed-upon controls consistently, catch gaps—like open API ports or overly permissive RBAC—and maintain compliance. Regularly following the checklist reduces surprises and keeps clusters hardened against both known and emerging threats.

Your production checklist should include: restricting API server access to trusted networks; enabling audit logs; encrypting etcd data at rest; enforcing least-privilege RBAC; applying pod security or admission policies; using network policies to isolate services; securing container images; rotating certificates; and validating CI/CD pipeline security. Each item locks down a layer of your cluster before traffic or workloads go live.

Teams should review the checklist at least quarterly and after any major Kubernetes version upgrade or architecture change. Frequent reviews catch configuration drift—such as new open ports or relaxed RBAC rules—and ensure controls adapt to new threats or added components.

Critical changes, like new namespaces or custom admission controllers, also warrant an immediate checklist review.

Open-source tools like kube-bench audit your cluster against CIS Kubernetes Benchmarks. Kube-hunter probes for exposures and misconfigurations. Polaris validates live workloads against custom policies. Native Kubernetes Audit logs feed into SIEMs for event monitoring.

Combined, these tools automate checks for control plane settings, RBAC, network policies, and more—making it easier to spot and fix deviations from your checklist.

You can start with the official Kubernetes Security Checklist on GitHub (kubernetes.io/docs/concepts/security/security-checklist/) or community-maintained guides like the krol3/kubernetes-security-checklist repository.

Many cloud providers and security vendors also publish downloadable PDF checklists—just search “Kubernetes Security Checklist PDF” to find examples you can tailor to your environment.

Implementation is a shared effort between DevOps, platform engineers, and security teams. Platform engineers configure control plane components and network policies. DevOps teams secure workloads and CI/CD pipelines.

Security teams define baseline controls, run audits, and monitor compliance. Together, they ensure each checklist item—from RBAC rules to pod security policies—is applied and validated.

Discover More About Cloud Security

What is Cloud Security?Cloud Security

What is Cloud Security?

Cloud security continuously monitors and protects your cloud services and assets. It identifies vulnerabilities, enforces controls, and defends proactively. Learn more.

Read More
What is the Cloud Shared Responsibility Model?Cloud Security

What is the Cloud Shared Responsibility Model?

The cloud shared responsibility model defines security roles. Explore how understanding this model can enhance your cloud security strategy.

Read More
What is Kubernetes?Cloud Security

What is Kubernetes?

Kubernetes is a powerful orchestration tool for containers. Explore how to secure your Kubernetes environments against potential threats.

Read More
What is GKE (Google Kubernetes Engine)?Cloud Security

What is GKE (Google Kubernetes Engine)?

Google Kubernetes Engine (GKE) simplifies Kubernetes management. Learn best practices for securing applications deployed on GKE.

Read More
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2025 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use