O'Reilly logo

Kubernetes for Serverless Applications by Russ McKendrick

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing serverless services

We have installed and connected each of our services on both our local Kubernetes cluster and the cloud. So far, though, we haven't really had to think about securing them—which is the question we raised at the end of the last chapter.

The following sections will discuss how secure each tool is in its default configuration and what potential risks this configuration exposes you to. I won't be going into much detail about how to secure each tool, though where appropriate I will provide links to documentation.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required