Admission Controllers - One Part of Your Kubernetes Security and Governance Toolkit

Admission Controllers - One Part of Your Kubernetes Security and Governance Toolkit

CNCF [Cloud Native Computing Foundation] via YouTube Direct link

Kubernetes Mitigations and Controls

3 of 13

3 of 13

Kubernetes Mitigations and Controls

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Admission Controllers - One Part of Your Kubernetes Security and Governance Toolkit

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Kubernetes common attack vectors
  3. 3 Kubernetes Mitigations and Controls
  4. 4 Rego Language: The Basics
  5. 5 Security Integration Points
  6. 6 Kubernetes Security Best Practices
  7. 7 Enforce a Trusted Registry
  8. 8 Don't allow 'dev', 'latest', or 'master' image tags in prod
  9. 9 Prevent Privileged Pods
  10. 10 Prevent sensitive host system mounts
  11. 11 Make the container filesystem read only
  12. 12 Prevent NodePort Services
  13. 13 Resources Example Policies

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.