The alert went off at 02:17. An unauthorized process had hooked into the payment microservice. This was sidecar injection—and it was a PCI DSS compliance nightmare.
Sidecar injection happens when an attacker—or even a misconfigured deployment—plants a container alongside your application in the same pod or namespace. It rides the internal network, intercepts traffic, and captures cardholder data before encryption or tokenization. This violates multiple PCI DSS requirements: segmentation of cardholder data environments, strict access controls, continuous monitoring, and preventing untrusted code from touching payment flows.
The mechanics are simple, but the risk is high. In Kubernetes and similar orchestrators, sidecars are common for logging, monitoring, and proxying. Without hardened admission controls, a malicious sidecar can slip in. Once injected, it can bypass perimeter defenses, because it exists inside your trusted cluster. For PCI DSS compliance, this is unacceptable. Requirement 1.2.3 calls for isolating CDE from other systems. Requirement 6.5 enforces secure coding and deployment practices. A rogue sidecar undermines both.