Kubernetes security checklist includes authentication, authorization, kubelet security, managing secrets, admission control, Kubernetes security boundaries, network security, Kubernetes auditing and logging, and "Open" defaults. Role-based access control is the preferred method for creating robust roles and access policies in Kubernetes. It is important to ensure that the kubelet API is locked down appropriately and to manage secrets with caution, avoiding building them into images and considering passing them in files for increased security.
















