In this chapter, we took a serious look at a serious topic: security. Microservice-based architectures and Kubernetes make the most sense to large-scale enterprise-distributed systems that support mission-critical objectives and often manage sensitive information. On top of the challenges of developing and evolving such complex systems, we must be aware that such systems present very enticing targets to attackers.
We must use a rigorous process and best practices to protect the system, the users, and the data. From here, we covered security principles and best practices, and we also saw how they support each other and how Kubernetes dedicates a lot of effort to allowing them to develop and operate our system securely.
We also discussed the pillars that act as the foundation of microservice security on Kubernetes: the triple A of authentication/authorization/admission,...