reklama - zainteresowany?

Learning Kubernetes Security. A practical guide for secure and scalable containerized environments - Second Edition - Helion

Learning Kubernetes Security. A practical guide for secure and scalable containerized environments - Second Edition
ebook
Autor: Raul Lapaz
Tytuł oryginału: Learning Kubernetes Security. A practical guide for secure and scalable containerized environments - Second Edition
ISBN: 9781835886397
Format: ebook
Księgarnia: Helion

Cena książki: 129,00 zł

Książka będzie dostępna od maja 2025

With readily available services, support, and tools, Kubernetes has become a foundation for digital transformation and cloud-native development but brings significant security challenges like breaches and supply chain attacks.
This updated edition equips you with defense strategies to protect your applications and infrastructure while understanding the attacker mindset, including tactics like container escapes and exploiting vulnerabilities to compromise clusters. The book guides you through Kubernetes components, architecture, and networking, and addresses key security domains—authentication, authorization, image scanning, resource monitoring, and traffic sniffing. You’ll implement security controls using third-party plugins (krew) and tools like Falco, Tetragon, and Cilium. You’ll also learn how to secure core components like the kube-apiserver, CoreDNS, and kubelet, while hardening images, managing security contexts, and applying PodSecurityPolicy. Through practical examples, the book teaches advanced techniques like redirecting traffic from misconfigured clusters to rogue pods and enhances your support incident response with effective cluster monitoring and log analysis.
By the end of the book, you'll have a solid grasp of container security and the skills to defend your clusters against evolving threats.

Spis treści

Learning Kubernetes Security. A practical guide for secure and scalable containerized environments - Second Edition eBook -- spis treści

  • 1. Kubernetes Architecture
  • 2. Kubernetes Networking
  • 3. Threat Modeling
  • 4. Applying the Principle of Least Privilege in Kubernetes
  • 5. Configuring Kubernetes Security Boundaries
  • 6. Securing Cluster Components
  • 7. Authentication, Authorization, and Admission Control
  • 8. Securing Pods
  • 9. Shift Left (Scanning, SBOM, and CI/CD)
  • 10. Real-Time Monitoring and Observability
  • 11. Security Monitoring and Log Analysis
  • 12. Defense in Depth
  • 13. Kubernetes Vulnerabilities and Container Escapes
  • 14. Third-Party Security Plugins
  • 15. Kubernetes 1.30: New Security Features

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2025 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.