From the course: Securing Containers and Kubernetes Ecosystem

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Securing applications in Kubernetes

Securing applications in Kubernetes - Kubernetes Tutorial

From the course: Securing Containers and Kubernetes Ecosystem

Start my 1-month free trial

Securing applications in Kubernetes

- [Instructor] The security of images, containers and hosts is a critical part of your strategy to protect your containers ecosystem. But when you introduce an orchestrator such as Kubernetes, you increase the attack surface exponentially. You saw in the earlier chapters Kubernetes brings with it several moving parts that keep your workloads running without much human intervention. When it comes to the security of Kubernetes, we can see it from two different dimensions. First, the security of your pods and applications running in a cluster. And secondly, the security of the cluster and its native components. Securing applications requires proper isolation among parts. It also requires implementing access control, including authentication, authorization and mission control. It includes protecting the networking among the pods. And lastly, the secrets management. To protect the Kubernetes orchestrator itself requires…

Contents