Learn Kubernetes Security
"Secure your container environment against cyberattacks and deliver robust deployments with this practical guide Key Features Explore a variety of Kubernetes components that help you to prevent cyberattacks Perform effective resource management and monitoring with Prometheus and built-in Kubern...
Other Authors: | , , |
---|---|
Format: | eBook |
Language: | Inglés |
Published: |
Packt Publishing
2020.
|
Edition: | First edition |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630863806719 |
Table of Contents:
- Chapter 1: Kubernetes Architecture
- Chapter 2: Kubernetes Networking
- Chapter 3: Threat Modeling
- Chapter 4: Applying the Principle of Least Privilege in Kubernetes
- Chapter 5: Configuring Kubernetes Security Boundaries
- Chapter 6: Securing Cluster Components
- Chapter 7: Authentication, Authorization, and Admission Control
- Chapter 8: Securing Kubernetes Pods
- Chapter 9: Image Scanning in DevOps Pipelines
- Chapter 10: Real-Time Monitoring and Resource Management of a Kubernetes Cluster
- Chapter 11: Defense in Depth
- Chapter 12: Analyzing and Detecting Crypto-Mining Attacks
- Chapter 13: Learning from Kubernetes CVEs.