17: Real-world Kubernetes security
The previous chapter showed you how to threat-model Kubernetes using the STRIDE model. In this chapter, you’ll learn about security-related challenges you’re likely encounter when implementing Kubernetes in the real world.
The goal of the chapter is to show you things from the kind of high-level view a security architect has. It does not give cookbook style solutions.
The chapter is divided into the following four sections:
- Security in the software delivery pipeline
- Infrastructure and networking
- Identity and access management
- Security monitoring and auditing
Security in the software delivery pipeline
Containers revolutionized the way we build, ship, and run applications. Unfortunately, this has also made ...
Get The Kubernetes Book - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.