YoVDO

Can You Keep a Secret? Securely Interacting with Edge Devices in Kubernetes

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Edge Computing Courses Kubernetes Courses Access Control Courses Secret Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore secure interactions with edge devices in Kubernetes through this informative conference talk. Delve into the challenges of orchestrating workloads on edge devices, including security concerns and authentication mechanisms for leaf devices. Learn how to dynamically bridge leaf devices to a cluster and determine the authenticity of newly discovered devices at scale. Discover enhancements made to Akri, a CNCF sandbox project, for integrating Kubernetes secrets and secret stores to uniquely identify devices in a cluster. Gain insights on connecting edge devices securely and restricting resource access based on customizable criteria, making it accessible even for Kubernetes newcomers.

Syllabus

Can You Keep a Secret? Securely Interacting with Edge Devices i... Adithya Jayachandran & Yu Jin Kim


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Access Control Concepts
(ISC)² via Coursera
AZ-303 Part 2 - Implement Management and Security Solutions in Azure
A Cloud Guru
Google Cloud Identity and Access Management (IAM) Deep Dive
A Cloud Guru
Google Kubernetes Engine Deep Dive
A Cloud Guru
HashiCorp Vault
A Cloud Guru