Summary
In this chapter, we focused on security in Kubernetes. We started with a look into cluster RBAC using identities in Azure AD. After that, we continued with storing secrets in Kubernetes. We went into detail about creating, decoding, and using secrets. Finally, we installed and injected Istio, achieving the goal of being able to set system-wide policies without needing developer intervention or oversight. Since hackers like to pick on easy systems, the skills that you have learned in this chapter will help to make your setup less likely to be targeted.
In the next and final chapter, you will learn how to deploy serverless functions on Azure Kubernetes Service (AKS).