Learn Kubernetes Security

"Secure your container environment against cyberattacks and deliver robust deployments with this practical guide Key Features Explore a variety of Kubernetes components that help you to prevent cyberattacks Perform effective resource management and monitoring with Prometheus and built-in Kubern...

Full description

Bibliographic Details
Other Authors: Huang, Kaizhe, (author) (author), Jumde, Pranjal, (author), Degioanni, Loris, (author)
Format: eBook
Language:Inglés
Published: Packt Publishing 2020.
Edition:First edition
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630863806719
Table of Contents:
  • Chapter 1: Kubernetes Architecture
  • Chapter 2: Kubernetes Networking
  • Chapter 3: Threat Modeling
  • Chapter 4: Applying the Principle of Least Privilege in Kubernetes
  • Chapter 5: Configuring Kubernetes Security Boundaries
  • Chapter 6: Securing Cluster Components
  • Chapter 7: Authentication, Authorization, and Admission Control
  • Chapter 8: Securing Kubernetes Pods
  • Chapter 9: Image Scanning in DevOps Pipelines
  • Chapter 10: Real-Time Monitoring and Resource Management of a Kubernetes Cluster
  • Chapter 11: Defense in Depth
  • Chapter 12: Analyzing and Detecting Crypto-Mining Attacks
  • Chapter 13: Learning from Kubernetes CVEs.