Hacking Kubernetes threat-driven analysis and defense
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vu...
Main Author: | |
---|---|
Format: | eBook |
Language: | Inglés |
Published: |
Sebastapol, CA :
O'Reilly Media
2021.
|
Edition: | First edition |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630967606719 |
Table of Contents:
- Preface
- Chapter 1. Introduction
- Chapter 2. Pod-Level Resources
- Chapter 3. Container Runtime Isolation
- Chapter 4. Applications and Supply Chain
- Chapter 5. Networking
- Chapter 6. Storage
- Chapter 7. Hard Multitenancy
- Chapter 8. Policy
- Chapter 9. Intrusion Detection
- Chapter 10. Organizations
- Appendix A. A Pod-Level Attack
- Appendix B. Resources.