Hacking Kubernetes
- 0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Hacking Kubernetes

 EPUB
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9781492081685
Veröffentl:
2021
Einband:
EPUB
Seiten:
314
Autor:
Michael Hausenblas
eBook Typ:
EPUB
eBook Format:
EPUB
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share best-practice configuration to help you harden clusters from possible angles of attack.This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system.Understand where your Kubernetes system is vulnerable with threat modelling techniquesFocus on pods, from configurations to attacks and defensesSecure your cluster and workload trafficDefine and enforce policy with RBAC, OPA, and KyvernoDive deep into sandboxing and isolation techniquesLearn how to detect and mitigate supply chain attacksExplore filesystems, volumes, and sensitive information at restDiscover what can go wrong when running multitenant workloads in a clusterLearn what you can do if someone breaks in despite you having controls in place
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share best-practice configuration to help you harden clusters from possible angles of attack.This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system.Understand where your Kubernetes system is vulnerable with threat modelling techniquesFocus on pods, from configurations to attacks and defensesSecure your cluster and workload trafficDefine and enforce policy with RBAC, OPA, and KyvernoDive deep into sandboxing and isolation techniquesLearn how to detect and mitigate supply chain attacksExplore filesystems, volumes, and sensitive information at restDiscover what can go wrong when running multitenant workloads in a clusterLearn what you can do if someone breaks in despite you having controls in place

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.