Hacking Kubernetes threat-driven analysis and defense
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vu...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Sebastapol, CA :
O'Reilly Media
2021.
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630967606719 |
Tabla de Contenidos:
- Preface
- Chapter 1. Introduction
- Chapter 2. Pod-Level Resources
- Chapter 3. Container Runtime Isolation
- Chapter 4. Applications and Supply Chain
- Chapter 5. Networking
- Chapter 6. Storage
- Chapter 7. Hard Multitenancy
- Chapter 8. Policy
- Chapter 9. Intrusion Detection
- Chapter 10. Organizations
- Appendix A. A Pod-Level Attack
- Appendix B. Resources.