Kubernetes Security Goes Deep

LinkedIn enhances Kubernetes security with a new framework automating workload identity and credential management, ensuring trust across its massive infrastructure.

8 min read
Diagram illustrating LinkedIn's Kubernetes workload security framework and certificate lifecycle management.
A high-level diagram showing LinkedIn's approach to securing Kubernetes workloads.· LinkedIn Engineering

Securing infrastructure at LinkedIn’s scale demands a comprehensive strategy, starting with trusted hardware and extending to every line of code. The company has detailed its approach to establishing a verifiable chain of trust for its Kubernetes workloads, a critical step in protecting user data and system integrity. This effort focuses on assigning every piece of software, from feed services to complex ML pipelines, a digital credential acting as a signed ID card.

Visual TL;DR. Growing Kubernetes Complexity leads to Next-Gen Security Framework. Next-Gen Security Framework enables Workload Identity Automation. Workload Identity Automation leads to cert-manager Integration. Workload Identity Automation leads to Kyverno Policy Integration. Workload Identity Automation via Automated Credential Management. Automated Credential Management leads to Prevent Identity Spoofing. Next-Gen Security Framework improves Reduced Developer Toil.

  1. Growing Kubernetes Complexity: securing varied systems like Flink streams, Airflow jobs, and databases
  2. Next-Gen Security Framework: building a comprehensive strategy for infrastructure at LinkedIn's scale
  3. Workload Identity Automation: assigning every piece of software a digital credential
  4. cert-manager Integration: automating certificate issuance for workload identity
  5. Kyverno Policy Integration: enforcing security policies on workloads
  6. Automated Credential Management: ensuring trust across massive infrastructure
  7. Prevent Identity Spoofing: attesting workload identity against internal Identity Registry
  8. Reduced Developer Toil: integrating security into the software lifecycle
Visual TL;DR
Visual TL;DR — startuphub.ai Growing Kubernetes Complexity leads to Next-Gen Security Framework. Next-Gen Security Framework enables Workload Identity Automation. Workload Identity Automation via Automated Credential Management. Automated Credential Management leads to Prevent Identity Spoofing enables via leads to Growing Kubernetes Complexity Next-Gen Security Framework Workload Identity Automation Automated Credential Management Prevent Identity Spoofing From startuphub.ai · The publishers behind this format
Visual TL;DR — startuphub.ai Growing Kubernetes Complexity leads to Next-Gen Security Framework. Next-Gen Security Framework enables Workload Identity Automation. Workload Identity Automation via Automated Credential Management. Automated Credential Management leads to Prevent Identity Spoofing enables via leads to GrowingKubernetes… Next-Gen SecurityFramework Workload IdentityAutomation AutomatedCredential… Prevent IdentitySpoofing From startuphub.ai · The publishers behind this format
Visual TL;DR — startuphub.ai Growing Kubernetes Complexity leads to Next-Gen Security Framework. Next-Gen Security Framework enables Workload Identity Automation. Workload Identity Automation via Automated Credential Management. Automated Credential Management leads to Prevent Identity Spoofing enables via leads to Growing Kubernetes Complexity securing varied systems like Flinkstreams, Airflow jobs, and databases Next-Gen Security Framework building a comprehensive strategy forinfrastructure at LinkedIn's scale Workload Identity Automation assigning every piece of software adigital credential Automated Credential Management ensuring trust across massiveinfrastructure Prevent Identity Spoofing attesting workload identity againstinternal Identity Registry From startuphub.ai · The publishers behind this format
Visual TL;DR — startuphub.ai Growing Kubernetes Complexity leads to Next-Gen Security Framework. Next-Gen Security Framework enables Workload Identity Automation. Workload Identity Automation via Automated Credential Management. Automated Credential Management leads to Prevent Identity Spoofing enables via leads to GrowingKubernetes… securing variedsystems like Flinkstreams, Airflow… Next-Gen SecurityFramework building acomprehensivestrategy for… Workload IdentityAutomation assigning everypiece of software adigital credential AutomatedCredential… ensuring trustacross massiveinfrastructure Prevent IdentitySpoofing attesting workloadidentity againstinternal Identity… From startuphub.ai · The publishers behind this format
Visual TL;DR — startuphub.ai Growing Kubernetes Complexity leads to Next-Gen Security Framework. Next-Gen Security Framework enables Workload Identity Automation. Workload Identity Automation leads to cert-manager Integration. Workload Identity Automation leads to Kyverno Policy Integration. Workload Identity Automation via Automated Credential Management. Automated Credential Management leads to Prevent Identity Spoofing. Next-Gen Security Framework improves Reduced Developer Toil enables via leads to improves Growing Kubernetes Complexity securing varied systems like Flinkstreams, Airflow jobs, and databases Next-Gen Security Framework building a comprehensive strategy forinfrastructure at LinkedIn's scale Workload Identity Automation assigning every piece of software adigital credential cert-manager Integration automating certificate issuance forworkload identity Kyverno Policy Integration enforcing security policies on workloads Automated Credential Management ensuring trust across massiveinfrastructure Prevent Identity Spoofing attesting workload identity againstinternal Identity Registry Reduced Developer Toil integrating security into the softwarelifecycle From startuphub.ai · The publishers behind this format
Visual TL;DR — startuphub.ai Growing Kubernetes Complexity leads to Next-Gen Security Framework. Next-Gen Security Framework enables Workload Identity Automation. Workload Identity Automation leads to cert-manager Integration. Workload Identity Automation leads to Kyverno Policy Integration. Workload Identity Automation via Automated Credential Management. Automated Credential Management leads to Prevent Identity Spoofing. Next-Gen Security Framework improves Reduced Developer Toil enables via leads to improves GrowingKubernetes… securing variedsystems like Flinkstreams, Airflow… Next-Gen SecurityFramework building acomprehensivestrategy for… Workload IdentityAutomation assigning everypiece of software adigital credential cert-managerIntegration automatingcertificateissuance for… Kyverno PolicyIntegration enforcing securitypolicies onworkloads AutomatedCredential… ensuring trustacross massiveinfrastructure Prevent IdentitySpoofing attesting workloadidentity againstinternal Identity… Reduced DeveloperToil integratingsecurity into thesoftware lifecycle From startuphub.ai · The publishers behind this format

This system aims to prevent 'identity spoofing' by attesting each workload's identity against an internal Identity Registry. The entire process is integrated into the software lifecycle, ensuring workloads are identified and secured from creation.

Building a Next-Generation Security Framework

As LinkedIn's infrastructure expands, so does the diversity of workloads requiring robust security. The challenge lies in securing varied systems like Flink streams, Airflow jobs, and third-party databases such as Couchbase and MySQL. To meet this, LinkedIn extended cert-manager, a popular open-source certificate management tool.

A key enabler is cert-manager's CSI driver, which injects certificates directly into workload containers as volumes. This method ensures private keys remain on the node, mitigating exfiltration risks.

The multi-cluster architecture presented a significant hurdle, as jobs orchestrated in one cluster can spawn workers in another. The workload identity system needed to operate consistently across these boundaries, demanding standardized certificate issuance and attestation.

cert-manager Integration at LinkedIn

LinkedIn utilizes cert-manager for automated certificate management, including issuance, rotation, and deletion. Crucially, it integrates seamlessly with an internal Identity Registry for strong workload attestation. The platform is adaptable, supporting custom issuers and approver policies.

Related startups

Two modes cater to different workload needs: 'Fully Managed' for most deployments, activated by a simple label, and 'Self Serve' for manually deployed services or external platforms.

The 'Fully Managed' solution integrates open-source cert-manager components with internal systems: an Identity Registry for global unique identities, an HSM Service for secure key access, and a Mutating Admission Webhook to inject cert-manager's CSI volume. A custom component, Lipki-Controller, acts as a CertificateRequest Approver and Issuer, validating requests, performing attestation, and signing certificates.

Automated Workflow for Workload Identity

The automated workflow issues a unique digital identity upon workload creation. Deployment systems add a `spiffe: enabled` label, triggering the cert-manager mutating webhook.

This webhook injects a CSI volume, mounting it read-only into the application container with metadata like application name and issuer details.

As pods are scheduled, the cert-manager CSI driver creates a CertificateRequest (CR) referencing the workload and issuer. The Lipki-controller then validates the CR, performs workload attestation via the Identity Registry, and issues a signed certificate.

This signed certificate is securely and transparently mounted into the pod by the CSI driver.

Kyverno Policy Integration

Integrating with Kyverno policies adds crucial security guardrails. Two policies restrict certificate issuance to PKI team-managed resources and control who can create CertificateRequests via RBAC.

Adoption Strategy and Developer Experience

LinkedIn’s adoption strategy prioritized automated trust, zero-friction security, and a seamless transition. Every workload automatically receives attested identity certificates, enabling mutual TLS (mTLS) for encrypted, verified service interactions.

The goal was to eliminate developer toil by making secure configurations the default. This allows developers to focus on features while infrastructure handles security.

Full backward compatibility ensured platform stability during migration, allowing legacy and new certificates to coexist and providing rollback capabilities.

Real-time observability dashboards track adoption progress, identifying services needing migration. The rollout began with an opt-in model, using the `spiffe: enabled` label for SPIFFE-based certificates.

Reducing Developer Toil with Library Integrations

To simplify adoption, LinkedIn developed authentication libraries for Java, Go, and Rust. These libraries abstract the complexities of credential management, enabling secure mTLS connections.

Certificates and keys are mounted to restricted paths within containers, protected by file access controls. By integrating these libraries into standard service frameworks, secure defaults became the norm across major languages.

Advanced TLS features, like hot-reloadable SSL contexts for `java-grpc` and `java-jetty`, allow applications to use renewed certificates without restarts, enhancing operational resilience.

Improving Security at Scale

Scaling cert-manager at LinkedIn revealed challenges with default configurations under high load, particularly during "deployment churn" where significant pod restarts occur.

The system must support thousands of nodes and hundreds of thousands of pods per cluster, demanding optimized performance from cert-manager components.

© 2026 StartupHub.ai. All rights reserved. Do not enter, scrape, copy, reproduce, or republish this article in whole or in part. Use as input to AI training, fine-tuning, retrieval-augmented generation, or any machine-learning system is prohibited without written license. Substantially-similar derivative works will be pursued to the fullest extent of applicable copyright, database, and computer-misuse laws. See our terms.