Overview
Syllabus
Intro
Shared responsibility model of major cloud vendor
Choises to use kubernetes environment (e. 9. ANS)
Mopped to a shared responsibility model (e. 9. ANS) • ARS and user responsibility for security when running container.
Security & Compliance of CNCF Landscape
Points to consider for kubernetes security
Firewall • Control network communication between each component.
Encryption
Secret management
Usage example of sealed-secrets
How to management secret values
Backup of runtime resource of kubernetes
Managing kubernetes resouces with GitOps
Vulnerability checking throughout the container life cycle
Vulnerability considerations for cluster and node
Vulnerability check of build and ship phase
Vulnerability considerations for container of run phoze
Introducing some setting of Pod Security Policy
Vulnerability check of run phase
The three pillars of observability
The CNCF End User Technology Radar
Governance / Compliance
Introducing Falco
Conclusion
Taught by
Linux Foundation