Security hardening for running OpenClaw on a K3s cluster. Six layers
of defense-in-depth applied to the deployment.
Security Layers
- Network Policies: restrict ingress/egress to required endpoints only
- RBAC: minimal service account permissions
- Seccomp profiles: syscall filtering
- Read-only root filesystem: tmpfs for writable paths only
- Resource limits: CPU and memory caps to prevent resource exhaustion
- Pod Security Standards: restricted PSS profile
Challenges
- K3s uses Traefik by default, which complicates network policy enforcement
- Seccomp profiles need to be deployed to each node
- Read-only filesystem requires identifying all writable paths upfront
Related Blog Posts