Kubernetes security: operating Kubernetes clusters and applications safely
Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This practical ebook walks you through Kubernetes security features--including when to use what--and shows yo...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Sebastopol, CA
O'Reilly Media
2018
|
Ausgabe: | First edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781492039075/?ar |
Zusammenfassung: | Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This practical ebook walks you through Kubernetes security features--including when to use what--and shows you how to augment those features with container image best practices and secure network communication. Liz Rice from Aqua Security and Michael Hausenblas from Red Hat not only describe practical security techniques for Kubernetes but also maintain an accompanying website. Developers will learn how to build container images with security in mind, and ops folks will pick up techniques for configuring and operating a Kubernetes cluster more securely. Explore security concepts including defense in depth, least privilege, and limiting the attack surface Safeguard clusters by securing worker nodes and control plane components, such as the API server and the etcd key value store Learn how Kubernetes uses authentication and authorization to grant fine-grained access Secure container images against known vulnerabilities and abuse by third parties Examine security boundaries and policy enforcement features for running containers securely Learn about the options for handling secret information such as credentials Delve into advanced topics such as monitoring, alerting, and auditing, as well as sandboxing and runtime protection. |
Beschreibung: | Online resource; title from title page (Safari, viewed January 17, 2019) |
Umfang: | 1 Online-Ressource (1 volume) Illustrationen |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047628677 | ||
003 | DE-627-1 | ||
005 | 20240228120633.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)047628677 | ||
035 | |a (DE-599)KEP047628677 | ||
035 | |a (ORHE)9781492039075 | ||
035 | |a (DE-627-1)047628677 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Rice, Liz |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Kubernetes security |b operating Kubernetes clusters and applications safely |c Liz Rice and Michael Hausenblas |
250 | |a First edition. | ||
264 | 1 | |a Sebastopol, CA |b O'Reilly Media |c 2018 | |
264 | 4 | |c ©2018 | |
300 | |a 1 Online-Ressource (1 volume) |b Illustrationen | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title page (Safari, viewed January 17, 2019) | ||
520 | |a Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This practical ebook walks you through Kubernetes security features--including when to use what--and shows you how to augment those features with container image best practices and secure network communication. Liz Rice from Aqua Security and Michael Hausenblas from Red Hat not only describe practical security techniques for Kubernetes but also maintain an accompanying website. Developers will learn how to build container images with security in mind, and ops folks will pick up techniques for configuring and operating a Kubernetes cluster more securely. Explore security concepts including defense in depth, least privilege, and limiting the attack surface Safeguard clusters by securing worker nodes and control plane components, such as the API server and the etcd key value store Learn how Kubernetes uses authentication and authorization to grant fine-grained access Secure container images against known vulnerabilities and abuse by third parties Examine security boundaries and policy enforcement features for running containers securely Learn about the options for handling secret information such as credentials Delve into advanced topics such as monitoring, alerting, and auditing, as well as sandboxing and runtime protection. | ||
650 | 0 | |a Electronic data processing |x Distributed processing | |
650 | 0 | |a Application software |x Development | |
650 | 0 | |a Open source software | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Traitement réparti | |
650 | 4 | |a Logiciels d'application ; Développement | |
650 | 4 | |a Logiciels libres | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Application software ; Development | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Electronic data processing ; Distributed processing | |
650 | 4 | |a Open source software | |
700 | 1 | |a Hausenblas, Michael |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781492039075/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047628677 |
---|---|
_version_ | 1831287086793097217 |
adam_text | |
any_adam_object | |
author | Rice, Liz Hausenblas, Michael |
author_facet | Rice, Liz Hausenblas, Michael |
author_role | aut aut |
author_sort | Rice, Liz |
author_variant | l r lr m h mh |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047628677 (DE-599)KEP047628677 (ORHE)9781492039075 |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03243cam a22004932c 4500</leader><controlfield tag="001">ZDB-30-ORH-047628677</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120633.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047628677</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047628677</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781492039075</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047628677</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rice, Liz</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kubernetes security</subfield><subfield code="b">operating Kubernetes clusters and applications safely</subfield><subfield code="c">Liz Rice and Michael Hausenblas</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media</subfield><subfield code="c">2018</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title page (Safari, viewed January 17, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This practical ebook walks you through Kubernetes security features--including when to use what--and shows you how to augment those features with container image best practices and secure network communication. Liz Rice from Aqua Security and Michael Hausenblas from Red Hat not only describe practical security techniques for Kubernetes but also maintain an accompanying website. Developers will learn how to build container images with security in mind, and ops folks will pick up techniques for configuring and operating a Kubernetes cluster more securely. Explore security concepts including defense in depth, least privilege, and limiting the attack surface Safeguard clusters by securing worker nodes and control plane components, such as the API server and the etcd key value store Learn how Kubernetes uses authentication and authorization to grant fine-grained access Secure container images against known vulnerabilities and abuse by third parties Examine security boundaries and policy enforcement features for running containers securely Learn about the options for handling secret information such as credentials Delve into advanced topics such as monitoring, alerting, and auditing, as well as sandboxing and runtime protection.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing</subfield><subfield code="x">Distributed processing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Development</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Traitement réparti</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels d'application ; Développement</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels libres</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software ; Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing ; Distributed processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source software</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hausenblas, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781492039075/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047628677 |
illustrated | Not Illustrated |
indexdate | 2025-05-05T13:24:20Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) Illustrationen |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | O'Reilly Media |
record_format | marc |
spelling | Rice, Liz VerfasserIn aut Kubernetes security operating Kubernetes clusters and applications safely Liz Rice and Michael Hausenblas First edition. Sebastopol, CA O'Reilly Media 2018 ©2018 1 Online-Ressource (1 volume) Illustrationen Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title page (Safari, viewed January 17, 2019) Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This practical ebook walks you through Kubernetes security features--including when to use what--and shows you how to augment those features with container image best practices and secure network communication. Liz Rice from Aqua Security and Michael Hausenblas from Red Hat not only describe practical security techniques for Kubernetes but also maintain an accompanying website. Developers will learn how to build container images with security in mind, and ops folks will pick up techniques for configuring and operating a Kubernetes cluster more securely. Explore security concepts including defense in depth, least privilege, and limiting the attack surface Safeguard clusters by securing worker nodes and control plane components, such as the API server and the etcd key value store Learn how Kubernetes uses authentication and authorization to grant fine-grained access Secure container images against known vulnerabilities and abuse by third parties Examine security boundaries and policy enforcement features for running containers securely Learn about the options for handling secret information such as credentials Delve into advanced topics such as monitoring, alerting, and auditing, as well as sandboxing and runtime protection. Electronic data processing Distributed processing Application software Development Open source software Computer networks Security measures Traitement réparti Logiciels d'application ; Développement Logiciels libres Réseaux d'ordinateurs ; Sécurité ; Mesures Application software ; Development Computer networks ; Security measures Electronic data processing ; Distributed processing Hausenblas, Michael VerfasserIn aut |
spellingShingle | Rice, Liz Hausenblas, Michael Kubernetes security operating Kubernetes clusters and applications safely Electronic data processing Distributed processing Application software Development Open source software Computer networks Security measures Traitement réparti Logiciels d'application ; Développement Logiciels libres Réseaux d'ordinateurs ; Sécurité ; Mesures Application software ; Development Computer networks ; Security measures Electronic data processing ; Distributed processing |
title | Kubernetes security operating Kubernetes clusters and applications safely |
title_auth | Kubernetes security operating Kubernetes clusters and applications safely |
title_exact_search | Kubernetes security operating Kubernetes clusters and applications safely |
title_full | Kubernetes security operating Kubernetes clusters and applications safely Liz Rice and Michael Hausenblas |
title_fullStr | Kubernetes security operating Kubernetes clusters and applications safely Liz Rice and Michael Hausenblas |
title_full_unstemmed | Kubernetes security operating Kubernetes clusters and applications safely Liz Rice and Michael Hausenblas |
title_short | Kubernetes security |
title_sort | kubernetes security operating kubernetes clusters and applications safely |
title_sub | operating Kubernetes clusters and applications safely |
topic | Electronic data processing Distributed processing Application software Development Open source software Computer networks Security measures Traitement réparti Logiciels d'application ; Développement Logiciels libres Réseaux d'ordinateurs ; Sécurité ; Mesures Application software ; Development Computer networks ; Security measures Electronic data processing ; Distributed processing |
topic_facet | Electronic data processing Distributed processing Application software Development Open source software Computer networks Security measures Traitement réparti Logiciels d'application ; Développement Logiciels libres Réseaux d'ordinateurs ; Sécurité ; Mesures Application software ; Development Computer networks ; Security measures Electronic data processing ; Distributed processing |
work_keys_str_mv | AT riceliz kubernetessecurityoperatingkubernetesclustersandapplicationssafely AT hausenblasmichael kubernetessecurityoperatingkubernetesclustersandapplicationssafely |