Kubernetes resource (object) security
Throughout this chapter, you learned a little bit about Kubernetes resource security. Remember, Kubernetes resources can be anything from Pods to Ingress Controllers to Services. Essentially, anything running inside of the Kubernetes cluster that you’re reaching via the API is a Kubernetes resource.
In this section, you’re going to learn the top methods of today to secure Kubernetes resources within Kubernetes and by using third-party tools.
Pod security
When it comes to network security in a Kubernetes environment, there are two parts—the host network and the internal network. For the purposes of this section, we can’t go into host networking because every environment is going to be different. Whether it’s different physical hardware or virtual hardware setups, there’s no one-size-fits-all network environment.
However, there are a few helpful tips that work across every environment:
-
...