Hi @RakutenStorage,
Referencing the below diagram and the URL here Architecture which depicts ONTAP w/ Trident w/ OpenShift (understanding there are differences to standard K8s).
Q2: How does the system ensure that Tenant B cannot access pvc1 or its underlying PersistentVolume (PV)?
A2: SVM isolation between tenants
Q3: What security mechanisms are in place (e.g., namespace isolation, RBAC, storage-level encryption, etc.) to enforce tenant isolation and prevent unauthorized access?
A3: SVM isolation and K8s Kubernetes Storage Resource Quotas. You could have SVMs on different aggregates with aggregate encryption keys. Per volume encryption via NVE is supported with Trident.
Note:
If NAE (NetApp Aggregate Encryption) is enabled on the backend, any volume provisioned in Trident will be NAE-enabled.
If NAE is not enabled on the backend, any volume provisioned in Trident will be NVE-enabled (NetApp Volume Encryption) unless the NVE encryption flag is set to false (the default value) in the backend configuration.
- Reference Security
Q4: Are there any best practices to enhance security in a multi-tenant Kubernetes environment using NetApp Trident?
A4: Yes, refer to here Security
