The container dies. The connection stays open. That’s the breach you didn’t see coming.
Kubernetes Network Policies exist to prevent that moment. They define what pod can talk to what, which ports are open, and which directions traffic can flow. Done right, they enforce Zero Standing Privilege — no pod, service, or container has network access unless it is actively needed.
Zero Standing Privilege means no default open paths, no idle permissions waiting to be exploited. It’s not just security theater; it’s cutting attack surface to the absolute minimum. Every flow is intentional. Every connection has a reason. When the task ends, the privilege ends.
Without Network Policies, Kubernetes clusters default to wide-open networking between pods. Attackers can pivot freely after a single compromise. This is the opposite of Zero Standing Privilege. Network Policies reverse that risk by locking down ingress and egress rules at the namespace or pod level.