© Navin Sabharwal, Piyush Pandey 2020
N. Sabharwal, P. PandeyPro Google Kubernetes Engine https://doi.org/10.1007/978-1-4842-6243-6_6

6. GKE Security

Navin Sabharwal1  and Piyush Pandey2
(1)
New Delhi, Delhi, India
(2)
New Delhi, India
 
In this chapter, you will learn best practices to secure the GKE cluster. The following topics will be discussed:
  • Google Cloud Shared Responsibility Model (GCSRM)

  • Infrastructure Security

  • Application Development and Release Security

Introduction

IT security is an overall strategy to prevent unauthorized access to various assets, such as applications and network, data, and hardware resources. It also preserves sensitive data, maintains data integrity, and guards the entire ecosystem of an organization from malicious hackers. ...

Get Pro Google Kubernetes Engine: Network, Security, Monitoring, and Automation Configuration now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.