Improving your Kubernetes Workload Security with Hardware Virtualization - Fabian Deutsch, Red Hat & Samuel Ortiz, Intel (Intermediate Skill Level) (Slides Attached)

less than 1 minute read


On any given node, all Kubernetes workloads are running through software-only isolation. The security concerns related to that level of isolation could be mitigated by using hardware virtualization for both pods and traditional (legacy?) workloads. This talk will present two complementary approaches for doing so: Kata Containers and KubeVirt. We’ll be describing how both projects leverage CPU virtualization to implement a stronger security architecture for Kubernetes. When combining both approaches, one can run a wider range of workloads, from untrusted containers through Kata Containers to more traditional, lift and shift applications with KubeVirt.

Sched URL