KUBERNETES SECURITY
Updated 574 days ago
In the book we explore security concepts including defense in depth, least privilege, and limiting the attack surface. We discuss and show how to secure clusters, and you'll also learn how Kubernetes uses authentication and authorization. The book will teache you how to secure container images against known vulnerabilities and abuse by third parties, enforce policies on the container runtime level as well as the networking level, and give you to rundown on how to handle sensitive information such as credentials...
CVE-2018-1002105-Kubernetes privilege escalation and access to sensitive information...
Operating Kubernetes Clusters and Applications Safely