Hacking Kubernetes threat-driven analysis and defense

Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vu...

Descripción completa

Detalles Bibliográficos
Autor principal: Martin, Andrew (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Sebastapol, CA : O'Reilly Media 2021.
Edición:First edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630967606719
Tabla de Contenidos:
  • Preface
  • Chapter 1. Introduction
  • Chapter 2. Pod-Level Resources
  • Chapter 3. Container Runtime Isolation
  • Chapter 4. Applications and Supply Chain
  • Chapter 5. Networking
  • Chapter 6. Storage
  • Chapter 7. Hard Multitenancy
  • Chapter 8. Policy
  • Chapter 9. Intrusion Detection
  • Chapter 10. Organizations
  • Appendix A. A Pod-Level Attack
  • Appendix B. Resources.