KubeDojo

Kubelet Security

AK
by Alexis Kinsella··14 min read
Kubelet Security

The kubelet runs on every node in your cluster. It accepts API requests that can exec into containers, stream logs, read pod specs, and pull metrics. If an attacker reaches the kubelet API, they own the node and every workload on it.

The KCSA exam devotes 22% to Cluster Component Security, and the kubelet is the centerpiece. This article covers its API surface, authentication and authorization modes, the read-only port problem, and how TLS bootstrapping keeps node communications trustworthy.

Sign in to access this lesson

Create a free account or sign in to enroll in the KCSA — Kubernetes and Cloud Native Security Associate course and access all 39 lessons.

KCSA — Kubernetes and Cloud Native Security Associate

39 lessons

Browse the full course curriculum →