Security, Auditing, and Compliance
In the previous chapters, we established the foundations from a design, implementation, and operational perspective to address the challenges of Kubernetes Secrets management. We also highlighted key areas of concern by peeling each layer of our full-stack infrastructure onion while considering paths to reduce or even mitigate security exposures. However, no matter how much effort we put into motion, the following questions will always float around:
- How can our IT environments be secured enough?
- What are the best practices from a control and audit perspective?
- What are my Chief Information Security Officer (CISO) requirements?
This chapter kicks off the advanced topics of this handbook with a reversed approach based on the last question, “What are my CISO team requirements?” The answer is usually in the form of another question, such as “What are the regulations that my organization has to comply with?&...