Summary
In this chapter, you have learned about Kubernetes security best practices, and learned how to apply an end-to-end security approach to the cluster's infrastructure, network, containers, apps, secrets, apps, and the workload's runtime. You also learned how to apply and validate security compliance checks and tests. You developed all of the required templates and configuration as code for these best practices, controllers, and add-ons with Ansible and Terraform.
You deployed Kubernetes add-ons and controllers to provide essential services such as kube2iam
, Cert-Manager, Sealed Secrets, and Falco, in addition to tuning Kubernetes-native security features such as pod security policies, network policies, and RBAC.
You acquired a solid knowledge of Kubernetes security in this chapter, but you should do a detailed evaluation of your cluster security requirements and take further action to deploy any extra tools and configurations that may be required.
In the next...