12
Helm Security Considerations
As you have likely come to realize throughout this book, Helm is a powerful tool that makes deploying applications on Kubernetes simple and efficient. With that said, we need to ensure that we do not lose sight of security best practices when leveraging Helm. Luckily, Helm provides several ways to incorporate good security practices into everyday usage in ways that are simple to achieve, from the moment the Helm CLI is downloaded to the moment a Helm chart is installed into a Kubernetes cluster.
In this chapter, we will cover the following topics:
- Data provenance and integrity
- Developing secure and stable Helm charts
- Configuring RBAC rules
Technical requirements
This chapter will make use of the following technologies: ...
Get Managing Kubernetes Resources Using Helm - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.