5

Security, Auditing, and Compliance

In the previous chapters, we established the foundations from a design, implementation, and operational perspective to address the challenges of Kubernetes Secrets management. We also highlighted key areas of concern by peeling each layer of our full-stack infrastructure onion while considering paths to reduce or even mitigate security exposures. However, no matter how much effort we put into motion, the following questions will always float around:

  • How can our IT environments be secured enough?
  • What are the best practices from a control and audit perspective?
  • What are my Chief Information Security Officer (CISO) requirements?

This chapter kicks off the advanced topics of this handbook with a reversed approach ...

Get Kubernetes Secrets Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.