June 2025
Intermediate to advanced
338 pages
9h 17m
English
In this chapter, we will explore the security best practices for deploying GenAI applications on Kubernetes (K8s). We will begin by introducing the concept of “defense in depth” and then cover the key pillars of securing GenAI workloads – supply chain, host, network, and runtime security. Additionally, we will cover best practices for the management of secrets and the principle of least privilege to prevent unauthorized access to critical data and application credentials.
In this chapter, we’re going to cover the following main topics:
Read now
Unlock full access