Kubernetes Security

Kubernetes Security pdf epub mobi txt 電子書 下載2025

Michael Hausenblas is an AWS developer advocate.

Liz Rice is the Technology Evangelist with container security specialists Aqua Security, where she also works on container-related open source projects including kube-hunter, kube-bench and manifesto. She was Co-Chair of the CNCF’s KubeCon + CloudNativeCon 2018 events in Copenhagen, Shanghai and Seattle.

She has a wealth of software development, team, and product management experience from working on network protocols and distributed systems, and in digital technology sectors such as VOD, music, and VoIP. When not writing code, or talking about it, Liz loves riding bikes in places with better weather than her native London, and competing in virtual races on Zwift.

出版者:O'Reilly Media
作者:Michael Hausenblas
出品人:
頁數:75
译者:
出版時間:2018-11
價格:USD 0.42
裝幀:Paperback
isbn號碼:9781492039068
叢書系列:
圖書標籤:
  • 軟件工程 
  • 計算機科學 
  • 英文版 
  • 容器 
  • 分布式 
  • 2019 
  •  
想要找書就要到 小美書屋
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This practical ebook walks you through Kubernetes security features—including when to use what—and shows you how to augment those features with container image best practices and secure network communication.

Liz Rice from Aqua Security and Michael Hausenblas from Red Hat not only describe practical security techniques for Kubernetes but also maintain an accompanying website. Developers will learn how to build container images with security in mind, and ops folks will pick up techniques for configuring and operating a Kubernetes cluster more securely.

Explore security concepts including defense in depth, least privilege, and limiting the attack surface

Safeguard clusters by securing worker nodes and control plane components, such as the API server and the etcd key value store

Learn how Kubernetes uses authentication and authorization to grant fine-grained access

Secure container images against known vulnerabilities and abuse by third parties

Examine security boundaries and policy enforcement features for running containers securely

Learn about the options for handling secret information such as credentials

Delve into advanced topics such as monitoring, alerting, and auditing, as well as sandboxing and runtime protection

具體描述

讀後感

評分

評分

評分

評分

評分

用戶評價

评分

三四兩章基本是 Reference/Accessing the API 重新整理組織瞭一下,相對更簡短清晰一些,Authenticate 相關細節還是得看代碼(kubernetes/staging/src/k8s.io/apiserver/pkg/authentication);agg layer 逃不開 Auth proxy;正確的配置 Authenticate/Authorization,核心組件就不用自己去配 RBAC = =

评分

讀一讀也不是不行

评分

三四兩章基本是 Reference/Accessing the API 重新整理組織瞭一下,相對更簡短清晰一些,Authenticate 相關細節還是得看代碼(kubernetes/staging/src/k8s.io/apiserver/pkg/authentication);agg layer 逃不開 Auth proxy;正確的配置 Authenticate/Authorization,核心組件就不用自己去配 RBAC = =

评分

三四兩章基本是 Reference/Accessing the API 重新整理組織瞭一下,相對更簡短清晰一些,Authenticate 相關細節還是得看代碼(kubernetes/staging/src/k8s.io/apiserver/pkg/authentication);agg layer 逃不開 Auth proxy;正確的配置 Authenticate/Authorization,核心組件就不用自己去配 RBAC = =

评分

更像是一個博客集閤

本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度google,bing,sogou

© 2025 book.quotespace.org All Rights Reserved. 小美書屋 版权所有