Presented during KubeCon Amsterdam 2026.
Abstract:
Crank those propeller beanie‑caps to maximum lift, because once we breeze past the latest SIG Auth KEPs, we're zooming straight into two high‑octane technical adventures: the mysteries of ensure secret‑pulled images and the intricacies of conditional authorization. Prepare for turbulence, nerdy delight, and a guided tour through truly unruly authorization air currents.
Constrained Impersonation and Conditional Authorization finally allow you to escape "all-or-nothing" semantics in favor of right-sized access control policies. These features make it possible to define things like "only allow getting pods when impersonating a node", "Alice cannot set the 'sensitive' label on write requests" or "a controller can only add or remove its own finalizer, not others'".
Next, we'll explore "Ensure Secret Pulled Images," a long-awaited fix for a 10-year-old security gap. Learn how Kubelet now verifies credentials for cached images, ensuring that IfNotPresent doesn't mean "IfPresentForAnyone."
Whether you're managing access control policies, building controllers or securing multi-tenant clusters, this session will equip you with the knowledge to lock down your environment like never before.
Sched link: https://kccnceu2026.sched.com/event/4d59f77c5425685d3ed868124c70fd79
Recording: TBA
Location: Europaplein 24, 1078 GZ Amsterdam, Netherlands