Chapter 6: Securing Kubernetes Effectively

In previous chapters, you learned how to design and provision the infrastructure of Kubernetes clusters, fine-tune their configuration, and deploy extra add-ons and services on top of the clusters, such as networking, security, monitoring, and scaling.

In this chapter, you will learn about the different aspects of Kubernetes security, focusing on qualifying the cluster to have a production-grade security. We will follow an end-to-end security approach to cover all of the essential areas that every production cluster should have. We will know how to bring the cluster security closer to the production readiness state by fine-tuning the security configuration of the cluster and its infrastructure and deploying ...

Get Kubernetes in Production Best Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.