Security & DevSecOps Practical By Samson Tanimawo, PhD Published Dec 6, 2025 4 min read

Network Policy: Egress Control

Default-deny egress prevents data exfiltration.

Idea

The default in most Kubernetes clusters is that any pod can reach any external destination on the internet. This is convenient for development and catastrophic for security. A compromised pod can dial out to an attacker-controlled command-and-control server, exfiltrate data, or pull additional malware payloads. The fix is default-deny egress: pods cannot reach the internet unless they have explicit permission.

What default-deny egress actually means:

Default-deny egress is one of the highest-impact, lowest-cost security investments a Kubernetes operator can make. The discipline is mostly about doing the migration carefully, not about novel technology.

Setup

The mechanism for default-deny egress is the Kubernetes NetworkPolicy resource (or its more sophisticated equivalents in Cilium, Calico, or service meshes). Setting it up is straightforward; doing the migration without breaking existing workloads is the operational work.

The NetworkPolicy adoption is a multi-month project for an existing fleet. Done in stages with audit-then-enforce, it is straightforward and low-risk. Done as a big-bang migration, it produces an outage.

Benefit

The benefit of default-deny egress is that it changes the calculus of compromise. An attacker who lands in a pod no longer has the entire internet at their disposal; they have only the destinations that pod was allowed to reach. The blast radius of a compromise drops dramatically.

Default-deny egress is the network security posture that turns Kubernetes from a flat, internet-attached mesh into a structured, gated network. Nova AI Ops integrates with NetworkPolicy enforcement, audits the whitelist for over-permissive rules, and surfaces the egress traffic patterns so the security team can see whether the policy is being respected and where the exceptions are.