Learn Kubernetes Security by Kaizhe Huang and Pranjal Jumde

Learn Kubernetes Security by Kaizhe Huang and Pranjal Jumde

Author:Kaizhe Huang and Pranjal Jumde
Language: eng
Format: epub
Publisher: Packt Publishing Pvt. Ltd.
Published: 2020-08-07T00:00:00+00:00


If you follow the security recommendations from the preceding CIS Docker benchmarks, you will be successful in hardening your container image. This is the first step in securing pods in the build stage. Now, let's look at the security attributes we need to pay attention to in order to secure a pod.

Configuring the security attributes of pods

As we mentioned in the previous chapter, application developers should be aware of what privileges a microservice must have in order to perform tasks. Ideally, application developers and security engineers work together to harden the microservice at the pod and container level by configuring the security context provided by Kubernetes.

We classify the major security attributes into four categories:

Setting host namespaces for pods

Security context at the container level

Security context at the pod level

AppArmor profile



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.