Introducing Full Workload Inventory Visibility in ARMO: See What’s Running, What It’s Doing, and How It’s Protected
At ARMO, our mission is to make Kubernetes security more accessible, actionable, and effective. That’s...
Aug 21, 2025
Kubernetes v1.34 is coming soon, and it brings a rich batch of security upgrades – from alpha features that hint at the future of zero-trust Kubernetes, to mature enhancements making their way into stable releases. Whether you’re managing a production cluster or exploring new security patterns, this release has something worth your attention.
Pods can now request short-lived X.509 certificates from the Kubernetes API server and use them to authenticate via mutual TLS. This enables a clean and native approach to in-cluster workload identity without relying on external tools or sidecars.
Rather than disabling anonymous access cluster-wide, you can now configure it to apply only to specific safe paths (like /healthz, /livez, and /readyz). This prevents overly permissive anonymous access while preserving functionality for monitoring and load balancers.
📎 KEP-4633: AnonymousAuthConfigurableEndpoints
You can now restrict access to resources based on selectors in list, watch, and deleteCollection operations. For example, limit a kubelet to view only the pods on its node using spec.nodeName=$NODE.
📎 KEP-4601: Authorizer Request Context Selectors
ServiceAccount tokens can now be signed using an external KMS or HSM via a new gRPC interface. This improves key security by enabling rotation, offloading signing from the API server, and aligning with compliance needs.
📎 KEP-740: Service Account Token Volume Projection – External Signing
No more long-lived imagePullSecrets. Kubernetes can now use short-lived, per-pod tokens automatically generated for accessing private registries. These tokens are OIDC-compliant and auto-rotated by the system.
📎 KEP-4412: Pod Service Account Token for Image Pulls
Kubernetes now supports mutating admission policies written using CEL (Common Expression Language) directly in the API server—no external webhook required. This simplifies setup and improves performance while supporting re-evaluation logic.
ARMO’s Kubescape, the CNCF’s Incubating open-source Kubernetes security platform, will enhance its CEL admission control library in the upcoming release to support these new in-process mutating policies. This will allow users to define and enforce mutating admission policies directly within Kubescape, leveraging the same CEL framework as Kubernetes itself.
📎 KEP-3962: CEL for Mutating Admission Policies
You can now mount artifacts stored in OCI registries directly into pods as read-only volumes. This is useful for securely distributing config files, binaries, or ML models without baking them into container images.
📎 KEP-4639: Mounting Artifacts as Volumes
Feature | Security Benefit | Action |
---|---|---|
Mutual TLS for Pods | Enables pod-to-API secure identity | Test alpha feature in dev clusters |
Scoped Anonymous Access | Prevents overexposed unauthenticated access | Review API server config |
Field/Label-Aware RBAC | Enforces least privilege at node/pod granularity | Update roles with selectors |
External JWT Signing | Eliminates local key exposure | Integrate with existing KMS |
Pod-Scoped Tokens | Prevents static secret leakage | Migrate from imagePullSecrets |
CEL Mutation Policies | Simplifies secure mutation logic | Define CEL-based policies |
OCI Artifact Volumes | Secure delivery of external files | Replace sidecar/manual content injection |
The Kubernetes 1.34 release reflects a growing focus on zero-trust principles, secure defaults, and native, reliable policy enforcement. From in-cluster identities to hardened token workflows and registry access, these updates make it easier for platform teams to deliver secure infrastructure – without reinventing the wheel.
Stay secure, stay curious.
— Brought to you by ARMO, creators of Kubescape, the open-source Kubernetes security platform and one of the leading KSPM solutions.
At ARMO, our mission is to make Kubernetes security more accessible, actionable, and effective. That’s...
We’re excited to announce that ARMO now fully supports Google Kubernetes Engine (GKE) Autopilot clusters!...
Kubernetes 1.33 marks another exciting milestone in the evolution of this widely adopted container orchestration...