Chapter 6: Securing Kubernetes Effectively
In previous chapters, you learned how to design and provision the infrastructure of Kubernetes clusters, fine-tune their configuration, and deploy extra add-ons and services on top of the clusters, such as networking, security, monitoring, and scaling.
In this chapter, you will learn about the different aspects of Kubernetes security, focusing on qualifying the cluster to have a production-grade security. We will follow an end-to-end security approach to cover all of the essential areas that every production cluster should have. We will know how to bring the cluster security closer to the production readiness state by fine-tuning the security configuration of the cluster and its infrastructure and deploying new security add-ons and tools, and finally ensure cluster security compliance and conformance to security standards and checks.
In this chapter, we will cover the following topics:
- Securing Kubernetes infrastructure
- Managing...