No one wanted to touch it, but it was the blocker for production.
Kubernetes network policies control how pods talk to each other and to the outside world. Without them, every pod is wide open. Attackers can pivot across services. Sensitive workloads can be reached from less secure ones. The procurement ticket exists because even in a DevOps-driven world, implementing network restrictions is still a process—security review, requirements gathering, and approvals.
A complete procurement ticket for Kubernetes network policies should include:
- Namespace scope and target workloads
- Ingress rules detailing allowed sources and ports
- Egress rules for outbound connections and destinations
- Label selectors to match specific pods
- Policy type: ingress, egress, or both
- Compliance or audit references
- Testing and rollout plan
Link the ticket to your cluster inventory. Include YAML definitions for each proposed policy. This makes approval faster because reviewers see exactly what will be applied. Avoid vague descriptions; define every CIDR, port, and protocol.