Kubernetes security attacking and defending Kubernetes

Like many complex systems Kubernetes has historically been insecure by default, and contains a number of "footguns" that make secure deployments difficult. Segregation of duty, least privilege, and a rigorous Continuous Security approach are the foundations of any secure system--however th...

Descripción completa

Detalles Bibliográficos
Autor Corporativo: O'Reilly (Firm), publisher (publisher)
Otros Autores: Martin, Andrew, presenter (presenter)
Formato: Video
Idioma:Inglés
Publicado: [Sebastopol, California] : O'Reilly Media, Inc [2021]
Edición:[First edition]
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009825906106719
Descripción
Sumario:Like many complex systems Kubernetes has historically been insecure by default, and contains a number of "footguns" that make secure deployments difficult. Segregation of duty, least privilege, and a rigorous Continuous Security approach are the foundations of any secure system--however these become more difficult to achieve in distributed systems with many moving parts. But all is not lost! With an understanding of the foundational layers and principles including micro-segmentation, zero trust, and local PKI, Kubernetes can be secured against the most ardent of attackers. The course guides attendees through an introduction to Linux container security, and progresses to advanced Kubernetes cluster security. It emphasizes pragmatic threat modelling and risk assessment based on an understanding of the tools and primitives available.
Descripción Física:1 online resource (1 video file (2 hr., 46 min.)) : sound, color