A work in progress collection of resources for securing a kubernetes cluster.
A good understanding of the k8s architecture and automating operations of your cluster is probably the best place to start:
- https://github.com/kubernetes/kubernetes/blob/release-1.3/docs/design/security.md
- https://github.com/kelseyhightower/kubernetes-the-hard-way
It should also be noted that the kubelet api has no authentications and allows for remote code execution (this is how kubectl exec works).