13

KubeArmor Securing Your Runtime

As the popularity of Kubernetes grows, so does the need for robust security measures to protect workloads. We learned how to secure a cluster using RBAC, which allows us to control the access that users have to resources. Using RBAC, we can control what users can execute on a cluster, controlling if someone can create or delete a pod, view logs, view Secrets, etc. We also looked at securing clusters using Gatekeeper policies that can protect nodes by denying the creation of an object that contains a value against security policies like attempting to allow privilege escalation.

While these go a long way to securing clusters, there are certain actions that are often overlooked by many organizations. One of the ...

Get Kubernetes – An Enterprise Guide - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.