Hacking Kubernetes threat-driven analysis and defense

Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vu...

Full description

Bibliographic Details
Main Author: Martin, Andrew (-)
Format: eBook
Language:Inglés
Published: Sebastapol, CA : O'Reilly Media 2021.
Edition:First edition
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630967606719
Table of Contents:
  • Preface
  • Chapter 1. Introduction
  • Chapter 2. Pod-Level Resources
  • Chapter 3. Container Runtime Isolation
  • Chapter 4. Applications and Supply Chain
  • Chapter 5. Networking
  • Chapter 6. Storage
  • Chapter 7. Hard Multitenancy
  • Chapter 8. Policy
  • Chapter 9. Intrusion Detection
  • Chapter 10. Organizations
  • Appendix A. A Pod-Level Attack
  • Appendix B. Resources.