Operating Kubernetes Clusters and Applications Safely
Hello and welcome to Kubernetes Security, the resource center for the O’Reilly book on this topic by Liz Rice and Michael Hausenblas.
In the book we explore security concepts including defense in depth, least privilege, and limiting the attack surface. We discuss and show how to secure clusters, and you’ll also learn how Kubernetes uses authentication and authorization. The book will teache you how to secure container images against known vulnerabilities and abuse by third parties, enforce policies on the container runtime level as well as the networking level, and give you to rundown on how to handle sensitive information such as credentials.
Relevant pages in the official Kubernetes documentation:
Further reading:
Tooling:
Introductions and overview resources for authn & authz in Kubernetes:
Tooling:
Relevant pages in the official Kubernetes documentation:
Further reading:
Tooling:
Relevant pages in the official Kubernetes documentation:
Further reading:
Tooling:
Further reading:
Tooling:
Relevant pages in the official Kubernetes documentation:
Further reading:
Tooling:
Relevant pages in the official Kubernetes documentation:
Further reading:
Tooling:
Tooling:
API and resource references relevant to security (Kubernetes v1.19) docs:
kubectl
commandskubectl create secret
… docskubectl create serviceaccount
… docskubectl create role
… docskubectl create rolebinding
… docskubectl auth can-i
… docsThe logo uses a padlock icon by Freepik from www.flaticon.com and the Kubernetes logo kudos to the CNCF, The Linux Foundation.