From the course: Securing Containers and Kubernetes Ecosystem

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Five factors

Five factors - Kubernetes Tutorial

From the course: Securing Containers and Kubernetes Ecosystem

Start my 1-month free trial

Five factors

- [Sam] After seeing the attack surface, we can appreciate the complexity of efforts that might be required to keep it all protected. Therefore, we need a structured approach to security. We're going to apply a five factor security model. Each factor comprises of a set of security controls that work to protect this ecosystem. Let's take a quick look at them. The rest of the course will be a deep dive into each of these security factors. The first factor is all about secure design principles and coding practices that your developers and architects should adopt. The next factor focuses on the security of container images and image registries. This factor includes security controls required to protect images during creation, storage, transport, and retrieval. A container is a process instantiated from an image. Naturally, after securing images, the next factor focuses on security controls to protect running containers.…

Contents