Summary
In our journey of building a production-ready Kubernetes environment, security is a critical aspect. With that in mind, in this chapter, we examined how threat modeling allows us to think in an adversarial way about our application infrastructure and how it informs us of how we can defend it from attack. Then, we looked at the 4Cs of Cloud Native Security to understand where our attack surfaces are, followed by how Kubernetes can help us run workloads securely in the cluster.
Kubernetes has several security features that we can leverage to secure our cluster. We learned about three security measures that are important to leverage: RBAC, NetworkPolicies, and PodSecurityPolicies. We also learned about their various applications when it comes to securing access to your cluster, securing your container network, and securing your container runtimes.
In the next chapter, we're going to examine how to manage storage objects in Kubernetes and deal with apps that are stateful...