What's the point of SELinux support in a k8s environment, where services are already sandboxed by the container runtime?<p>It's unsafe to run untrusted workloads in the host kernel using only namespaces - SELinux does not change this, no matter how much Red Hat wants it to be true. The kernel has a massive attack surface. For untrusted workloads, you need virtualization like gVisor or Kata/Firecracker which isolates workloads from the host kernel.<p>SELinux can mitigate some logic bugs in the container runtime, yes, but it doesn't make your containers secure.<p>Also, the title of this submission on HN is inaccurate - Gravitational did not build SELinux support for k8s. Red Hat did, a long time ago. They added support for SELinux to their own product, Gravity.