Kubernetes Security: Cluster Setup
Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. This course will teach you how to perform a secure set-up of the Kubernetes cluster.
Like any other technology, if Kubernetes is not implemented correctly, it can be vulnerable to security threats. In this course, Kubernetes Security: Cluster Setup, you’ll learn to how to perform a secure set-up for your Kubernetes cluster. First, you’ll explore how the API traffic flows between components and learn how to encrypt it and restrict the traffic calls. Next, you’ll discover best practices to have in mind while securing the kubelet component. Finally, you’ll learn how to review the cluster security using the kube-bench open source tool to make sure your cluster set-up is not vulnerable. When you’re finished with this course, you’ll have the skills and knowledge of Kubernetes and security best practices needed to bootstrap a secure Kubernetes cluster.
Author Name: Antonio Jesús Piedra
Author Description:
Antonio is a DevOps Engineer who loves to experiment with cutting-edge technologies. He is a Certified Kubernetes Administrator, Application Developer and Security Specialist. Antonio likes to understand the end-to-end process and he is frequently involved in design reviews, Python development, creating Docker images, writing pipelines or building Kubernetes clusters at home using Raspberry Pi’s. In addition to his passion for technology, Antonio enjoys hiking and DIY projects.
Table of Contents
- Course Overview
1min - Encrypt All API Traffic
18mins - Restrict Network Traffic
9mins - Secure Kubelet
4mins - Review Cluster Security with Kube-bench
5mins
There are no reviews yet.