The New Stack Podcast

The Data Center is Olympus: Operational Approaches to Securing a Kubernetes Deployment

Episode Summary

What is the context for Kubernetes if the data center is Mount Olympus? This is the first question for Alcide co-founder and CTO Gadi Naor in this episode of The New Stack Makers podcast, included in our latest ebook, "Kubernetes Deployment & Security Patterns." Naor made an analogy between the mythic Mount Olympus, home of the Gods, and the modern data center. The comparison brings into play a concept about how the overall organization views infrastructure. The Olympus Naor describes as the data center now has the powers of Kubernetes. With the energy and force of such a power, how today’s organizations value and protect their core assets becomes a matter of first order. The first value must be defined by how organizations treat security in Kubernetes. Security is not best used as an add-on, Naor says. It must be native to the deployment. A second consideration is zero-trust, which is best embodied in a security-first approach. There must be considerations of clusters and how microservices make transactions across the interconnected Kubernetes architecture.

Episode Notes

What is the context for Kubernetes if the data center is Mount Olympus? This is the first question for Alcide co-founder and CTO Gadi Naor in this episode of The New Stack Makers podcast, included in our latest ebook, "Kubernetes Deployment & Security Patterns." Naor made an analogy between the mythic Mount Olympus, home of the Gods, and the modern data center.

The comparison brings into play a concept about how the overall organization views infrastructure. The Olympus Naor describes as the data center now has the powers of Kubernetes. With the energy and force of such a power, how today’s organizations value and protect their core assets becomes a matter of first order.

The first value must be defined by how organizations treat security in Kubernetes. Security is not best used as an add-on, Naor says. It must be native to the deployment. A second consideration is zero-trust, which is best embodied in a security-first approach. There must be considerations of clusters and how microservices make transactions across the interconnected Kubernetes architecture.