Chapter 9:
Helm Security Considerations
As you have likely come to realize throughout this book, Helm is a powerful tool that presents many deployment possibilities to users. This power can, however, get out of hand if certain security paradigms are not recognized and followed. Luckily, Helm provides many ways to incorporate security into everyday usage in ways that are simple to achieve, from the moment the Helm CLI is downloaded to the moment a Helm chart is installed on a Kubernetes cluster.
In this chapter, we will cover the following topics:
- Data provenance and integrity
- Helm chart security
- Additional considerations around RBAC, values, and chart repositories
Technical requirements
This chapter will make use of the following technologies: ...
Get Learn Helm now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.