Providing a secure end-to-end deployment pipeline is important when running Kubernetes in production. It’s important to understand each component of the deployment pipeline to better understand how to secure your cluster from certain attack scenarios.
Helm 3 removed a very significant piece of the architecture called Tiller. Many users are excited about the removal of Tiller, but it's left questions about how the security story changes for Helm 3.
In this session, we'll dive deep into Helm 3's architecture, what changed, and how the removal of Tiller affects Helm's security model. We'll also share best practices for securing Helm 3 in different operational contexts.
Matt is a core maintainer of the Helm project, and a Software Engineer at Microsoft. Off hours, Matt enjoys spending time camping, woodworking and spending time with his family.