Kubernetes Secrets Handbook Design, Implement, and Maintain Production-Grade Kubernetes Secrets Management Solutions
Gain hands-on skills in Kubernetes Secrets management, ensuring a comprehensive overview of the Secrets lifecycle and prioritizing adherence to regulatory standards and business sustainability Key Features Master Secrets encryption, encompassing complex life cycles, key rotation, access control, bac...
Other Authors: | |
---|---|
Format: | eBook |
Language: | Inglés |
Published: |
Birmingham, England :
Packt Publishing
[2024]
|
Edition: | First edition |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009799144306719 |
Table of Contents:
- Intro
- Title Page
- Copyright and Credits
- Dedicated
- Foreword
- Contributors
- Table of Contents
- Preface
- Part 1: Introduction to Kubernetes Secrets Management
- Chapter 1: Understanding Kubernetes Secrets Management
- Technical requirements
- Understanding Kubernetes' origins and design principles
- From bare metal to containers
- Kubernetes overview
- Kubernetes design principles
- Kubernetes architecture
- Getting hands-on
- from a local container to a Kubernetes Pod
- Secrets within Kubernetes
- Secrets concepts
- Storing Secrets on Kubernetes
- Why should we care?
- Security exposures
- Summary
- Chapter 2: Walking through Kubernetes Secrets Management Concepts
- Technical requirements
- What are Kubernetes Secrets, and how do they differ from other Kubernetes objects?
- Different types of Secrets and their usage scenarios
- Opaque
- Kubernetes service account token
- Docker config
- Basic authentication
- TLS client or server
- Token data
- Conclusion
- Creating, modifying, and deleting Secrets in Kubernetes
- data and stringData
- Updating Secrets
- Deleting Secrets
- Conclusion
- Kubernetes Secrets configuration in different deployment scenarios
- Secret usage among environments
- From development to deployment
- Conclusion
- Requirement for managing Secrets, including secure storage and access control
- Secure storage
- Access control
- Git and encryption
- Conclusion
- Securing access to Secrets with RBAC
- RBAC introduction
- RBAC and Secrets
- Conclusion
- Auditing and monitoring secret usage
- minikube note
- Summary
- Chapter 3: Encrypting Secrets the Kubernetes-Native Way
- Technical requirements
- Kubernetes-native encryption
- Standalone native encryption
- Native encryption with an external component
- Going further with securing etcd
- Linux system hardening
- Linux data encryption
- Transport
- Summary
- Chapter 4: Debugging and Troubleshooting Kubernetes Secrets
- Technical requirements
- Discussion of common issues with Kubernetes Secrets
- Helm and Helm Secrets
- Secret application pitfalls
- Debugging and troubleshooting Secrets
- The describe command
- Non-existing Secrets
- Badly configured Secrets
- Troubleshooting and observability solutions
- Best practices for debugging and troubleshooting Secrets
- Avoiding leaking Secrets
- Summary
- Part 2: Advanced Topics
- Kubernetes Secrets in a Production Environment
- Chapter 5: Security, Auditing, and Compliance
- Technical requirements
- Cybersecurity versus cyber risk
- Cybersecurity
- Cyber risk
- Conclusion
- Compliance standards
- Adopting a DevSecOps mindset
- Tools
- Trivy
- kube-bench
- Compliance Operator
- StackRox
- Kubernetes logging
- Summary
- Chapter 6: Disaster Recovery and Backups
- Technical requirements