Completed
cluster
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Continuous Kubernetes Security - Best Practices and Risk Mitigation
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 About Andrew
- 3 Why does this matter
- 4 Why not security
- 5 Everything is fine
- 6 Cuban actors
- 7 Agenda
- 8 Kubernetes is insecure
- 9 A back model
- 10 workload security
- 11 misconfigurations
- 12 deployment configuration tool
- 13 dashboard
- 14 cluster
- 15 security again
- 16 what Kubernetes looks like
- 17 bootstrap TLS nodes
- 18 back role access control
- 19 Legacy Authorization
- 20 Secure Port
- 21 Leaking Secrets
- 22 Certificate rotation
- 23 Pods
- 24 Table Security Policies
- 25 Resource linting
- 26 Deployments
- 27 Labels
- 28 Containers
- 29 Admission Controllers
- 30 Limit Ranger
- 31 Security Policy
- 32 Encryption
- 33 Sealed Secrets
- 34 Token Requests
- 35 Networking
- 36 Network Policy
- 37 Service Mesh
- 38 Deployment Strategies
- 39 Recap
- 40 Multiple Clusters
- 41 Container Runtimes