Language:
English
Pages:
1 online resource (1 video file (2 hr., 46 min.))
,
sound, color.
Edition:
[First edition].
DDC:
005.3
Keywords:
Application software Development
;
Computer programs
;
Computer security
;
Application program interfaces (Computer software)
;
Cloud computing
;
Instructional films
;
Nonfiction films
;
Internet videos
Abstract:
Like many complex systems Kubernetes has historically been insecure by default, and contains a number of “footguns” that make secure deployments difficult. Segregation of duty, least privilege, and a rigorous Continuous Security approach are the foundations of any secure system—however these become more difficult to achieve in distributed systems with many moving parts. But all is not lost! With an understanding of the foundational layers and principles including micro-segmentation, zero trust, and local PKI, Kubernetes can be secured against the most ardent of attackers. The course guides attendees through an introduction to Linux container security, and progresses to advanced Kubernetes cluster security. It emphasizes pragmatic threat modelling and risk assessment based on an understanding of the tools and primitives available.
Note:
Online resource; title from title details screen (O’Reilly, viewed June 2, 2022)
Permalink