Security & DevSecOps Practical By Samson Tanimawo, PhD Published Aug 13, 2025 4 min read

K8s Pod Security Hardening Checklist

Default pod settings are too permissive. The hardening.

Must have

The default Kubernetes pod has more privileges than most workloads need. Running as root, writable root filesystem, no sandbox, full Linux capabilities. Each of these is a privilege the workload almost certainly does not need but which an attacker can exploit if they compromise the workload. Pod security hardening tightens the defaults to match what real workloads actually need, which is much less.

What every production pod must have:

The "must have" list is non-negotiable for production workloads. The cost is a few YAML lines per pod; the protection is dramatic.

Should have

The next tier of hardening is the "should have" list. These add defense in depth on top of the must-have baseline. Most workloads can adopt them with modest configuration; the security gain is significant.

The should-have list is where the team's security maturity shows. Adopting these takes a few quarters of incremental work; the cumulative protection is large.

Avoid

The third list is what to avoid. These are the privilege escalations that should be rare and deliberate rather than routine. Workloads using them need a specific justification and a specific scope.

Pod security hardening reduces the blast radius of any compromise from "the cluster" to "the specific pod." Nova AI Ops audits pod specs against the must-have, should-have, and avoid lists, surfaces the deviation patterns, and tracks the cluster's security posture over time so the team can see whether the hardening discipline is improving or eroding.