Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Focused on Security Measures in Kubernetes Environment

Linux Foundation via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore security measures in Kubernetes environments through this conference talk by Hiroki Akiba from OGIS-RI Co.,Ltd. Delve into the shared responsibility model of major cloud vendors and examine choices for using Kubernetes environments. Learn about security and compliance within the CNCF landscape, focusing on crucial aspects such as firewalls, encryption, and secret management. Discover usage examples of sealed-secrets and techniques for managing secret values. Investigate backup strategies for Kubernetes runtime resources and the implementation of GitOps for resource management. Gain insights into vulnerability checking throughout the container lifecycle, including considerations for clusters, nodes, and containers in various phases. Examine Pod Security Policy settings and explore the three pillars of observability. Familiarize yourself with the CNCF End User Technology Radar and governance/compliance tools like Falco. This comprehensive overview equips you with essential knowledge to enhance security in Kubernetes deployments.

Syllabus

Intro
Shared responsibility model of major cloud vendor
Choises to use kubernetes environment (e. 9. ANS)
Mopped to a shared responsibility model (e. 9. ANS) • ARS and user responsibility for security when running container.
Security & Compliance of CNCF Landscape
Points to consider for kubernetes security
Firewall • Control network communication between each component.
Encryption
Secret management
Usage example of sealed-secrets
How to management secret values
Backup of runtime resource of kubernetes
Managing kubernetes resouces with GitOps
Vulnerability checking throughout the container life cycle
Vulnerability considerations for cluster and node
Vulnerability check of build and ship phase
Vulnerability considerations for container of run phoze
Introducing some setting of Pod Security Policy
Vulnerability check of run phase
The three pillars of observability
The CNCF End User Technology Radar
Governance / Compliance
Introducing Falco
Conclusion

Taught by

Linux Foundation

Reviews

Start your review of Focused on Security Measures in Kubernetes Environment

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.