Section 2: Securing Kubernetes Deployments and Clusters

In this section, you will learn through hands-on exercises how to secure Kubernetes deployments/clusters in two ways: you will learn how to secure a DevOps pipeline in build, deployment, and runtime stages, and you will learn about defense in depth, looking at compliance, configuration, identity, authorization, resource management, logging and monitoring, detection, and incident response.

The following chapters are included in this section:

  • Chapter 6, Securing Cluster Components
  • Chapter 7, Authentication, Authorization, and Admission Control
  • Chapter 8, Securing Kubernetes Pods
  • Chapter 9, Image Scanning in DevOps Pipelines
  • Chapter 10, Real-Time Monitoring and Resource Management of a Kubernetes Cluster
  • Chapter 11, Defense in Depth
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.58.121.131