Filtered by:
Tag
When 37% of Cloud Environments Are Vulnerable, "Just Use VMs" Isn't Good Enough
When 37% of Cloud Environments Are Vulnerable, "Just Use VMs" Isn't Good Enough
Feb 16, 2026
|
5
min Read
How vNode delivers VM-level isolation for containerized AI workloads — without the VM overhead
A three-line Dockerfile broke container security. CVE-2025-23266 exposed 37% of cloud environments running AI workloads, giving attackers full root access to Kubernetes nodes. VMs are too heavy, gVisor can't catch it. vNode offers a third option: container-native isolation that's as strong as VMs but as lightweight as containers.
Comparisons
Platform Engineering
Security
Use Cases
vCluster
Why the nodes/proxy Kubernetes RCE Does Not Apply to vCluster
Why the nodes/proxy Kubernetes RCE Does Not Apply to vCluster
Feb 3, 2026
|
5
min Read
How vCluster provides more security than vanilla Kubernetes when using nodes/proxy permissions for monitoring stacks
A security researcher recently disclosed that Kubernetes nodes/proxy permissions can be exploited for remote code execution. Kubernetes labeled it "working as intended" and issued no CVE. Since vCluster was mentioned in the disclosure, we investigated how this vulnerability affects our users. The conclusion: vCluster is not compromised and actually provides more security than vanilla Kubernetes when using features that require the nodes/proxy permission.
Kubernetes Insights
Platform Engineering
Security
vCluster
Separate Clusters Aren’t as Secure as You Think — Lessons from a Cloud Platform Engineering Director
Separate Clusters Aren’t as Secure as You Think — Lessons from a Cloud Platform Engineering Director
Jan 14, 2026
|
4
min Read
Lessons in Intentional Tenancy and Security at Scale from a Cloud Platform Director
If a workload needs isolation, give it its own cluster. It sounds safe, but at scale, this logic breaks down. Learn why consistency, not separation, is the real security challenge in modern Kubernetes environments.
Platform Engineering
Multi-Tenancy
Security
vCluster
NVIDIAScape: How vNode prevents this container breakout without the need for VMs
NVIDIAScape: How vNode prevents this container breakout without the need for VMs
Jul 21, 2025
|
6
min Read
Container breakouts on GPU nodes are real, and just three lines of code can be enough. Discover how vNode neutralizes vulnerabilities like NVIDIAScape without relying on VMs.
NVIDIAScape (CVE-2025-23266) is a critical GPU-related vulnerability that allows attackers to break out of containers and gain root access. While some respond by layering in virtual machines, this blog walks through a better approach, how vNode uses container-native sandboxing to neutralize such attacks at the kernel level without sacrificing performance. Includes a step-by-step replication of the exploit, and a demo of how vNode prevents it.
Kubernetes Insights
Platform Engineering
Security
vCluster
Kubernetes RBAC: Simplifying Permissions and Security with vCluster
Kubernetes RBAC: Simplifying Permissions and Security with vCluster
Jan 7, 2025
|
7
min Read
Role-Based Access Control (RBAC) is an important concept and way of Kubernetes security with the help of which we control what users and workloads can do within the cluster. However, in multi-tenant environments, managing permissions can become complex. Virtual clusters present a...
Security
vCluster
Securing vCluster with OPA: Implementing Policy Enforcement for Virtual Clusters
Securing vCluster with OPA: Implementing Policy Enforcement for Virtual Clusters
Nov 26, 2024
|
7
min Read
Learn how to secure vCluster with OPA by enforcing policies for virtual clusters. Implement consistent policy enforcement for enhanced security.
A common security challenge many teams face when rolling out multiple clusters is ensuring consistency in security policies. As teams and clusters grow, applying policies across all environments can quickly become cumbersome. Each new cluster adds complexity, making it difficult ...
Security
vCluster
Container Image Trust with Sigstore Policy Controller and vCluster
Container Image Trust with Sigstore Policy Controller and vCluster
Oct 21, 2024
|
7
min Read
Supply chain security has become increasingly important in cloud native space. Recent incidents like the xz backdoor and even SolarWinds have shown that implicit trust in upstream dependencies can have dangerous cascading effects. It's common practice for organizations to set up ...
Security
vCluster
How Solutions Like Chainguard Help Container Image Security
How Solutions Like Chainguard Help Container Image Security
Jul 31, 2023
|
min Read
Enhance your container security with Chainguard's comprehensive solutions, ensuring vulnerability-free images and robust supply chain protection.
This guide explains how solutions like Chainguard can help with container image security for your specific use case
Security
Development
[Tutorial] Enforcing RBAC in Kubernetes
[Tutorial] Enforcing RBAC in Kubernetes
Jul 10, 2023
|
min Read
This article explores the importance of RBAC and how it's implemented for Kubernetes. It covers how RBAC implementation differs from traditional architectures and why.
Security
Access Control
Kubernetes Insights
Platform Engineering
Best practices for managing Kubernetes RBAC with GitOps
Best practices for managing Kubernetes RBAC with GitOps
Apr 25, 2023
|
min Read
In this article, we will discuss best practices for managing Kubernetes Role-Based Access Control (RBAC) with GitOps.
Security
GitOps
Access Control
Managing Kubernetes RBAC configurations with GitOps - Monitoring, Auditing, Templates and Automation, Security Considerations
Managing Kubernetes RBAC configurations with GitOps - Monitoring, Auditing, Templates and Automation, Security Considerations
Apr 24, 2023
|
min Read
Enhance Kubernetes security by managing RBAC configurations through GitOps, incorporating monitoring, auditing, templating, automation, and robust security practices.
In this article, we will delve deeper into the topic and explore how to monitor and audit RBAC configurations, implement RBAC policy templates and automation, and address security considerations when using GitOps for RBAC policy management.
Security
GitOps
Access Control
Managing Kubernetes RBAC configurations with GitOps - Getting Started and Practical Example
Managing Kubernetes RBAC configurations with GitOps - Getting Started and Practical Example
Apr 23, 2023
|
min Read
When it comes to managing Kubernetes RBAC configurations, using GitOps tools and techniques can help simplify the process and ensure consistency across your environments.
Security
GitOps
Access Control
Kubernetes Multi-tenancy and RBAC - Advanced Scenarios and Customization
Kubernetes Multi-tenancy and RBAC - Advanced Scenarios and Customization
Apr 22, 2023
|
min Read
Exploring advanced strategies for implementing RBAC and multi-tenancy in Kubernetes to achieve fine-grained access control and enhanced security.
In this third installment, we will delve deeper into advanced RBAC scenarios and customizations in multi-tenant clusters.
Multi-Tenancy
Security
Access Control
Kubernetes Insights
Kubernetes Multi-tenancy and RBAC - Management, Automation, Monitoring, and Auditing
Kubernetes Multi-tenancy and RBAC - Management, Automation, Monitoring, and Auditing
Apr 21, 2023
|
min Read
In this article, we’ll discuss the management and automation of RBAC policies, as well as the auditing and monitoring of access control policies in Multi-Tenant clusters.
Multi-Tenancy
Security
Access Control
Kubernetes Insights
Best Practices for Simplifying Kubernetes RBAC
Best Practices for Simplifying Kubernetes RBAC
Apr 20, 2023
|
min Read
By following best practices like establishing clear organizational policies, using pre-defined roles and templates, automating RBAC management, implementing regular audits, and leveraging third-party tools, organizations can simplify RBAC management and reduce the likelihood of unauthorized access
Security
Access Control
Kubernetes Multi-tenancy and RBAC - Implementation and Security Considerations
Kubernetes Multi-tenancy and RBAC - Implementation and Security Considerations
Apr 20, 2023
|
min Read
This article provides an in-depth guide to implementing role-based access control (RBAC) in multi-tenant Kubernetes clusters to ensure tenant isolation and improve security.
Multi-Tenancy
Security
Access Control
Kubernetes Insights
Top Reasons and the Impact of Kubernetes RBAC Complexity
Top Reasons and the Impact of Kubernetes RBAC Complexity
Apr 19, 2023
|
min Read
Navigating the challenges of Kubernetes RBAC: Understanding the causes and consequences of access control complexity in multi-tenant environments.
To mitigate these complexities, organizations must invest in skilled personnel, automated policy management tools, and constant monitoring.
Security
Access Control
The Complexity of Kubernetes RBAC
The Complexity of Kubernetes RBAC
Apr 18, 2023
|
min Read
Navigating the intricacies of Kubernetes Role-Based Access Control (RBAC) to ensure secure and efficient cluster management.
Managing RBAC configurations can be a challenging task, but it's essential for maintaining a secure Kubernetes environment.
Security
Access Control
Understanding Kubernetes RBAC Components
Understanding Kubernetes RBAC Components
Apr 17, 2023
|
min Read
we will explore the various components of Kubernetes RBAC and how you can use them to manage access to your Kubernetes resources effectively.
Security
Access Control
Enterprise
Introduction to Kubernetes RBAC
Introduction to Kubernetes RBAC
Apr 15, 2023
|
min Read
Kubernetes RBAC is a critical component of Kubernetes security and access management. RBAC provides granular access control, which is essential for securing large-scale, distributed Kubernetes environments.
Security
Access Control
Kubernetes Insights
8 Kubernetes Security Best Practices
8 Kubernetes Security Best Practices
Feb 28, 2023
|
min Read
Strengthen your Kubernetes clusters by implementing eight essential security best practices to protect against common vulnerabilities.
By following these kubernetes security best practices, you can ensure that your cluster is properly protected against potential threats.
Security
Kubernetes Insights
Teleport vs. Loft for Kubernetes Access Control
Teleport vs. Loft for Kubernetes Access Control
Jul 12, 2022
|
min Read
Compare Teleport and Loft to determine the optimal Kubernetes access control solution for your organization's needs.
Explore the differences between Teleport and Loft in managing Kubernetes access control. This article delves into their approaches to authentication, authorization, auditing, and user management, helping you choose the right tool for secure and efficient Kubernetes cluster access.
Security
Access Control
Comparisons
Kubernetes Insights
Kubernetes Multi-Cluster Part 3: Authentication and Access Control
Kubernetes Multi-Cluster Part 3: Authentication and Access Control
May 9, 2022
|
min Read
Implement centralized authentication and access control strategies for managing Kubernetes multi-cluster environments effectively.
This article will explore the process of designing an authentication approach by identifying the extent of access control required, how to implement it, and how it plays together with other parts of the system.
Security
Enterprise
Kubernetes Insights
Kubernetes and LDAP: Enterprise Authentication for Kubernetes
Kubernetes and LDAP: Enterprise Authentication for Kubernetes
Mar 22, 2022
|
min Read
In this article, you’ll learn about SSO for Kubernetes, its use cases, and how to implement LDAP SSO for Kubernetes using Loft.
Security
Enterprise
Access Control
Authentication
Tutorials
Five Dex Alternatives for Kubernetes Authentication
Five Dex Alternatives for Kubernetes Authentication
Mar 2, 2022
|
min Read
Authentication helps control access to cluster resources by first verifying a user’s identity. In Kubernetes, the API server needs to verify the identity of every request it receives. Such requests may come from a program like a pod or from a human user.
Security
Authentication
Platform Engineering
Dex for Kubernetes: How Does it Work?
Dex for Kubernetes: How Does it Work?
Feb 23, 2022
|
min Read
Integrate Dex with Kubernetes to enable secure, centralized authentication using your organization's existing identity providers.
Discover how Dex serves as an authentication bridge between Kubernetes and various identity providers. This article explains Dex's role in facilitating Single Sign-On (SSO) for Kubernetes, enhancing security, and simplifying user management by leveraging OpenID Connect (OIDC) protocols.
Authentication
Guides
Security
10 Essentials for Kubernetes Access Control
10 Essentials for Kubernetes Access Control
Feb 15, 2022
|
8
min Read
Kubernetes, an automated system for managing containerized applications, offers multiple benefits to developers. It eliminates application downtime by creating a new pod automatically when an existing pod crashes, and it allows teams to easily scale applications for traffic incre...
Security
Access Control
Authentication
Managing Access to Kubernetes Clusters for Engineering Teams
Managing Access to Kubernetes Clusters for Engineering Teams
Feb 7, 2022
|
min Read
Implementing effective access control strategies to manage Kubernetes clusters securely and efficiently.
Explore best practices for managing user access in Kubernetes clusters, including authentication methods, RBAC, and auditing with Loft.
Developer Experience
Security
Kubernetes Policy Enforcement: OPA vs jsPolicy
Kubernetes Policy Enforcement: OPA vs jsPolicy
Jan 5, 2022
|
min Read
Compare Open Policy Agent (OPA) and jsPolicy to determine the best Kubernetes policy enforcement tool for your organization's needs.
Explore the differences between OPA and jsPolicy for enforcing policies in Kubernetes clusters. This article examines their policy languages, testing capabilities, and suitability for various use cases, helping you choose the right tool for your environment.
Security
Comparisons
jsPolicy
Ready to take vCluster for a spin?

Deploy your first virtual cluster today.