Deep Dive Series – Episode 5 – Container and Kubernetes Security: Securing DevOps Environments
Sun Feb 01 2026
🎙️ Episode: Container and Kubernetes Security – Securing DevOps Environments
In this episode of the Deep Dive Series by Sec Oops, powered by Cyber View Point, hosts Ben, Moiz, and Sneh strip away the abstraction layers to expose the engine room of modern infrastructure: Containers and Kubernetes.
We debunk the myth of the "secure sandbox" by breaking down the Linux primitives — Namespaces and Cgroups — that actually power containers, revealing why "root in a container is root on the host." This episode dissects the 4C's of Cloud Native Security (Cloud, Cluster, Container, and Code), providing a comprehensive strategy for hardening the Kubernetes API server and killing the dangerous "cluster-admin" default mindset.
You’ll also hear insights on securing the software supply chain, solving the "garbage in, garbage out" problem by implementing image scanning and signing within your CI/CD pipelines. We explore the cultural shift of DevSecOps and how to bridge the gap between speed and security.
👉 Tune in to learn how to architect a defense-in-depth strategy for K8s, from implementing Network Policies and RBAC to detecting runtime threats—ensuring your orchestrator is as resilient as the applications it runs.
More
🎙️ Episode: Container and Kubernetes Security – Securing DevOps Environments In this episode of the Deep Dive Series by Sec Oops, powered by Cyber View Point, hosts Ben, Moiz, and Sneh strip away the abstraction layers to expose the engine room of modern infrastructure: Containers and Kubernetes. We debunk the myth of the "secure sandbox" by breaking down the Linux primitives — Namespaces and Cgroups — that actually power containers, revealing why "root in a container is root on the host." This episode dissects the 4C's of Cloud Native Security (Cloud, Cluster, Container, and Code), providing a comprehensive strategy for hardening the Kubernetes API server and killing the dangerous "cluster-admin" default mindset. You’ll also hear insights on securing the software supply chain, solving the "garbage in, garbage out" problem by implementing image scanning and signing within your CI/CD pipelines. We explore the cultural shift of DevSecOps and how to bridge the gap between speed and security. 👉 Tune in to learn how to architect a defense-in-depth strategy for K8s, from implementing Network Policies and RBAC to detecting runtime threats—ensuring your orchestrator is as resilient as the applications it runs.