- Mastering Kubernetes
- Gigi Sayfan
- 213字
- 2021-06-18 18:37:01
4 Securing Kubernetes
In Chapter 3, High Availability and Reliability, we looked at reliable and highly available Kubernetes clusters, the basic concepts, the best practices, how to do live updates, and the many design trade-offs regarding performance and cost.
In this chapter, we will explore the important topic of security. Kubernetes clusters are complicated systems composed of multiple layers of interacting components. Isolation and compartmentalization of different layers is very important when running critical applications. To secure the system and ensure proper access to resources, capabilities, and data, we must first understand the unique challenges facing Kubernetes as a general-purpose orchestration platform that runs unknown workloads. Then we can take advantage of various securities, isolation, and access control mechanisms to make sure the cluster, the applications running on it, and the data are all safe. We will discuss various best practices and when it is appropriate to use each mechanism.
At the end of this chapter, you will have a good understanding of Kubernetes security challenges. You will gain practical knowledge of how to harden Kubernetes against various potential attacks, establishing defense in depth, and will even be able to safely run a multi-tenant cluster while providing different users full isolation as well as full control over their part of the cluster.
- 大數據管理系統
- Hadoop 2.x Administration Cookbook
- 西門子S7-200 SMART PLC從入門到精通
- 一本書玩轉數據分析(雙色圖解版)
- 圖形圖像處理(Photoshop)
- 精通Excel VBA
- AWS Administration Cookbook
- 3D Printing for Architects with MakerBot
- 精通數據科學:從線性回歸到深度學習
- 軟件工程及實踐
- 網絡服務搭建、配置與管理大全(Linux版)
- Hands-On Data Warehousing with Azure Data Factory
- Unreal Development Kit Game Design Cookbook
- 工業機器人操作
- Hands-On Agile Software Development with JIRA