Home / Companies / Sysdig / Blog / Post Details
Content Deep Dive

Helm security and best practices

Blog post from Sysdig

Post Details
Company
Date Published
Author
Eduardo Mínguez
Word Count
2,292
Language
English
Hacker News Points
-
Summary

Helm is widely used to deploy Kubernetes applications due to its simplicity and integration capabilities with GitOps pipelines, yet its security is often overlooked, requiring users to implement their own safeguards. Helm simplifies the deployment process by offering a command interface, a repository with over 9,000 charts, and a templating engine that allows users to deploy complex applications easily. However, Helm charts are generally not secure by default, and users should employ best practices such as using role-based access control (RBAC), keeping charts updated, and verifying digital signatures to ensure security. Writing custom Helm charts involves recommendations like storing them in Git repositories, using consistent versioning, and creating test scenarios to validate deployments. Users should also encrypt Kubernetes secrets and be cautious with third-party charts by using tools to render and review manifests before deploying. While Helm does not automatically enforce security, the article provides comprehensive recommendations for enhancing the security of both consuming and creating Helm charts.