
As more organizations accelerate their digital transformation, cloud-native architectures and containerized workloads have become the foundation for innovation and scalability. Yet, with this evolution comes a shifting security landscape—one that is more dynamic, distributed, and complex than ever before. Protecting these modern environments demands not just traditional safeguards, but an adaptive, layered security strategy capable of keeping pace with rapid change.
Fortinet brings a robust portfolio of security solutions tailored for these challenges, empowering teams with deep visibility, granular control, and unified protection from code to cloud. In this article, we’ll explore essential pillars and proven best practices for Google Kubernetes Engine (GKE), including the use of private clusters to limit exposure, Workload Identity to securely map Kubernetes workloads to Google Cloud IAM, Binary Authorization to ensure only trusted container images are deployed, and Shielded GKE Nodes to strengthen node-level integrity. You’ll also discover how FortiCNAPP safeguards Kubernetes workloads, how FortiGate enhances visibility into outbound traffic patterns, and how the FortiWeb Ingress Controller defends external-facing services against evolving threats.
Whether your goal is to harden workloads, optimize performance, or boost resilience, this guide will show how combining best practices with Fortinet’s integrated platform can help you confidently secure your cloud-native applications in today’s fast-moving threat landscape.
GKE Benchmark Best Practices
Google Kubernetes Engine (GKE) delivers a fully managed Kubernetes service, but securing it effectively requires following proven best practices. Applying industry benchmarks such as the CIS Kubernetes Benchmark and Google Cloud’s GKE hardening guidelines helps ensure that your clusters are secure, reliable, and cost-efficient. When using FortiCNAPP for Kubernetes Security Posture Management (KSPM), it’s important to understand how its capabilities support compliance enforcement and strengthen the overall security posture of your GKE environment.
Key Considerations:
Private Clusters
Workload Identity
Binary Authorization
Shielded GKE Nodes
GKE Networking Best Practices for Visibility and Control
Networking is a critical component of GKE security. The choice of networking mode directly impacts how traffic is routed, inspected, and controlled—especially when integrating with Fortinet solutions like FortiGate and FortiWeb.
Networking Recommendations:
Code & Container Scanning: Understanding Vulnerabilities
In today's fast-paced development environments, containerized applications are becoming the norm. However, with this shift comes the critical need for robust security measures. Code and container scanning are essential practices to identify and mitigate vulnerabilities within containerized applications. These scans help detect issues in the base images, application code, and dependencies, ensuring that potential security weaknesses are addressed before deployment.
Key Considerations:
FortiCNAPP for Kubernetes Admission Control
FortiCNAPP integrates seamlessly with Kubernetes Admission Controllers to enhance security during the deployment process. By using the ValidatingAdmissionWebhook, FortiCNAPP scans container images for vulnerabilities before they are deployed, ensuring that only secure images are admitted into the production environment. This proactive approach helps prevent the introduction of vulnerabilities and maintains the integrity of your GKE clusters.
Key Considerations:
See Integrate with Kubernetes Admission Controller
FortiCNAPP Pod Visibility
Visibility into Kubernetes pods is crucial for maintaining security and operational efficiency. FortiCNAPP offers both sidecar and agent options to monitor pod activity. These agents provide detailed insights into processes, network connections, and other critical metrics within the pods. By leveraging these visibility options, organizations can detect and respond to threats in real time, ensuring the security of their containerized applications running on GKE.
Key Considerations:
Architecture Overview
The proposed architecture is a secure and scalable Google Cloud deployment model designed for containerized workloads running on Google Kubernetes Engine (GKE). It incorporates both a Web Application Firewall (WAF) for secure ingress—implemented with FortiWeb—and a Next-Generation Firewall (NGFW) for secured and inspected egress traffic—implemented with FortiGate. This setup follows Zero Trust principles while enabling centralized security enforcement, comprehensive observability, and high availability across the GKE environment.
There is a special project assigned to the security hub with trusted/internal VPC and an untrusted/external VPC. There is a project for the GKE cluster, and there are several options for the interconnection with the security hub, peering is one of them.
Architecture
Ingress Traffic Protection with FortiWeb
Securing incoming traffic is critical to protecting Kubernetes workloads in Google Kubernetes Engine (GKE) from external threats. FortiWeb enhances ingress security by providing advanced capabilities such as a Web Application Firewall (WAF), SSL/TLS termination, and intelligent load balancing. These features work together to block malicious requests, minimize the risk of data exposure, and ensure that only trusted traffic reaches your applications.
Although FortiWeb can operate as a Kubernetes Ingress Controller, its primary strength lies in augmenting the security posture of publicly accessible services, regardless of the ingress solution deployed in your GKE environment.
Key Considerations:
Ingress
Egress Traffic Visibility with FortiGate
Monitoring egress traffic in Google Kubernetes Engine (GKE) is crucial for detecting and preventing data exfiltration, command-and-control communications, and other malicious outbound activity. FortiGate provides deep visibility and control over egress flows, ensuring that all outbound connections from workloads are inspected, logged, and filtered in alignment with Zero Trust and compliance requirements.
How FortiGate Enables Egress Control in GKE
FortiGate integrates with the Google Cloud SDN Connector to dynamically discover Kubernetes resources such as pods, services, and namespaces in GKE. This integration allows FortiGate to:
Key Considerations:
In this design, all outbound traffic from GKE workloads is routed through FortiGate, where NAT and inspection are performed before reaching the internet or external services. This ensures comprehensive logging, policy enforcement, and threat detection on every egress flow.
Conclusion
Securing workloads in Google Kubernetes Engine (GKE) requires a holistic, layered security strategy that combines network segmentation, workload isolation, and continuous monitoring. Fortinet’s solutions — including FortiCNAPP, FortiGate, and FortiWeb — provide deep visibility, adaptive policy enforcement, and advanced threat protection across the entire Kubernetes lifecycle.
By applying the best practices described in this guide and integrating Fortinet’s security capabilities with GKE and Google Cloud services, organizations can reduce their attack surface, strengthen compliance alignment, and ensure high availability for critical applications. This approach positions teams to operate securely and efficiently in modern, cloud-native environments.
Connect with our Cloud Consulting Services team for expert guidance on advanced configurations and production deployments:
Email: consulting@fortinet.com
Learn more: Cloud Security Consulting Services
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.