Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Implementing an Auditable Access Control Strategy Using Cluster Certificate Authority Rotation

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Explore a comprehensive strategy for implementing auditable access control in Kubernetes clusters through certificate authority rotation. Learn how to address staff changes and credential exposures by enforcing a robust approach to revoking and renewing cluster access. Discover the importance of rotating cluster certificate authorities and downstream certificates for effective access management. Gain insights into zero-downtime rotation techniques for critical cluster components, including node kubelet client and server certificates, and cluster administrator certificates. Understand the process of CA cross-signing and its role in maintaining cluster availability during rotations. Follow a visual walkthrough of the workflow, observing how certificates for crucial cluster components evolve throughout the rotation process. Examine the benefits of cross-signing in enabling seamless rotations without disrupting existing cluster components. Finally, learn how to grant new access to the cluster once the rotation process is complete, ensuring a secure and auditable access control strategy for your Kubernetes environment.

Syllabus

Implementing an Auditable Access Control Strategy Using Cluster... - Tyler Lisowski & Kodie Glosser

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Implementing an Auditable Access Control Strategy Using Cluster Certificate Authority Rotation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.