Can You Keep a Secret? Securely Interacting with Edge Devices in Kubernetes
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore secure interactions with edge devices in Kubernetes through this informative conference talk. Delve into the challenges of orchestrating workloads on edge devices, including security concerns and authentication mechanisms for leaf devices. Learn how to dynamically bridge leaf devices to a cluster and determine the authenticity of newly discovered devices at scale. Discover enhancements made to Akri, a CNCF sandbox project, for integrating Kubernetes secrets and secret stores to uniquely identify devices in a cluster. Gain insights on connecting edge devices securely and restricting resource access based on customizable criteria, making it accessible even for Kubernetes newcomers.
Syllabus
Can You Keep a Secret? Securely Interacting with Edge Devices i... Adithya Jayachandran & Yu Jin Kim
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Continuous Delivery and DevOps with TFS and VSTS 2018, Managing BuildsPluralsight DevSecOps: Building a Secure Continuous Delivery Pipeline
LinkedIn Learning Microsoft DevOps Solutions: Designing a Sensitive Information Strategy
Pluralsight Microsoft Azure DevOps Engineer: Implement a Secure and Compliant Development Process
Pluralsight Linux Administration with Ansible: Advanced Ansible Automation
Pluralsight