Book Content
chapters • 11h total length
1. Kubernetes Architecture
2. Kubernetes Networking
3. Threat Modeling
4. Applying the Principle of Least Privilege in Kubernetes
5. Configuring Kubernetes Security Boundaries
6. Securing Cluster Components
7. Authentication, Authorization, and Admission Control
8. Securing Kubernetes Pods
9. Image Scanning in DevOps Pipelines
10. Real-Time Monitoring and Resource Management of a Kubernetes Cluster
11. Defense in Depth
12. Analyzing and Detecting Crypto-Mining Attacks
13. Learning from Kubernetes CVEs














