Learn Kubernetes Security
Kubernetes is a widely used opensource orchestration platform for managing container applications. Developers are not yet aware of the pitfalls of a containerized environment. This book takes you through core security principles, best practices, and real-world use cases to learn mitigation or prevention strategies from known attacks and CVEs.
Offered by
Difficulty Level
Intermediate
Completion Time
11h
Language
English
About Book
Who Is This Book For?
This book is for security consultants, cloud administrators, system administrators, and DevOps engineers interested in securing their container deployments. If you're looking to secure your Kubernetes clusters and cloud-based deployments, you'll find this book useful. A basic understanding of cloud computing and containerization is necessary to make the most of this book.
Learn Kubernetes Security
- About Book
- Who Is This Book For?
- Book Content
Book content
chapters • 11h total length
Kubernetes Architecture
Kubernetes Networking
Threat Modeling
Applying the Principle of Least Privilege in Kubernetes
Configuring Kubernetes Security Boundaries
Securing Cluster Components
Authentication, Authorization, and Admission Control
Securing Kubernetes Pods
Image Scanning in DevOps Pipelines
Real-Time Monitoring and Resource Management of a Kubernetes Cluster
Defense in Depth
Analyzing and Detecting Crypto-Mining Attacks
Learning from Kubernetes CVEs
Related Resources
Access Ready-to-Use Books for Free!
Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!