Can You Keep a Secret? Securely Interacting with Edge Devices in Kubernetes
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore secure interactions with edge devices in Kubernetes through this informative conference talk. Delve into the challenges of orchestrating workloads on edge devices, including security concerns and authentication mechanisms for leaf devices. Learn how to dynamically bridge leaf devices to a cluster and determine the authenticity of newly discovered devices at scale. Discover enhancements made to Akri, a CNCF sandbox project, for integrating Kubernetes secrets and secret stores to uniquely identify devices in a cluster. Gain insights on connecting edge devices securely and restricting resource access based on customizable criteria, making it accessible even for Kubernetes newcomers.
Syllabus
Can You Keep a Secret? Securely Interacting with Edge Devices i... Adithya Jayachandran & Yu Jin Kim
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Fog Networks and the Internet of ThingsPrinceton University via Coursera AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX Business Considerations for 5G with Edge, IoT, and AI
Linux Foundation via edX 5G Strategy for Business Leaders
Linux Foundation via edX Intel® Edge AI Fundamentals with OpenVINO™
Intel via Udacity