官术网_书友最值得收藏!

  • Mastering Kubernetes
  • Gigi Sayfan
  • 213字
  • 2021-06-18 18:37:01

4 Securing Kubernetes

In Chapter 3, High Availability and Reliability, we looked at reliable and highly available Kubernetes clusters, the basic concepts, the best practices, how to do live updates, and the many design trade-offs regarding performance and cost.

In this chapter, we will explore the important topic of security. Kubernetes clusters are complicated systems composed of multiple layers of interacting components. Isolation and compartmentalization of different layers is very important when running critical applications. To secure the system and ensure proper access to resources, capabilities, and data, we must first understand the unique challenges facing Kubernetes as a general-purpose orchestration platform that runs unknown workloads. Then we can take advantage of various securities, isolation, and access control mechanisms to make sure the cluster, the applications running on it, and the data are all safe. We will discuss various best practices and when it is appropriate to use each mechanism.

At the end of this chapter, you will have a good understanding of Kubernetes security challenges. You will gain practical knowledge of how to harden Kubernetes against various potential attacks, establishing defense in depth, and will even be able to safely run a multi-tenant cluster while providing different users full isolation as well as full control over their part of the cluster.

主站蜘蛛池模板: 长泰县| 荆州市| 东乡县| 嘉义市| 桦甸市| 行唐县| 株洲县| 乌兰县| 房产| 鹿泉市| 新巴尔虎左旗| 楚雄市| 江永县| 汶川县| 乌鲁木齐县| 鹿泉市| 崇义县| 虞城县| 永新县| 绍兴市| 锡林郭勒盟| 库伦旗| 莫力| 凯里市| 衡阳县| 扬中市| 高邑县| 四川省| 高州市| 宁化县| 漠河县| 方城县| 体育| 大方县| 连江县| 五峰| 滕州市| 星座| 兖州市| 泰顺县| 长岛县|