Section 2: Securing Kubernetes Deployments and Clusters
In this section, you will learn through hands-on exercises how to secure Kubernetes deployments/clusters in two ways: you will learn how to secure a DevOps pipeline in build, deployment, and runtime stages, and you will learn about defense in depth, looking at compliance, configuration, identity, authorization, resource management, logging and monitoring, detection, and incident response.
The following chapters are included in this section:
- Chapter 6, Securing Cluster Components
- Chapter 7, Authentication, Authorization, and Admission Control
- Chapter 8, Securing Kubernetes Pods
- Chapter 9, Image Scanning in DevOps Pipelines
- Chapter 10, Real-Time Monitoring and Resource Management of a Kubernetes Cluster
- Chapter 11, Defense in Depth