In this chapter, we will examine how to secure your microservices on Kubernetes in depth. This is a broad topic and we will focus on the aspects that are most relevant to developers who are building and deploying microservices in a Kubernetes cluster. You must be very rigorous with security because your adversaries will actively try to find cracks, infiltrate your system, access sensitive information, run botnets, steal your data, corrupt your data, destroy your data, and make your system unavailable. Security should be designed into the system and not sprinkled on top as an afterthought. We will address this by covering general security principles and best practices before delving into the security mechanisms that Kubernetes puts at your disposal.
In this chapter, we will cover the following topics:
- Applying sound security principles
- Differentiating...