Can You Keep a Secret? Securely Interacting with Edge Devices in Kubernetes
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore secure interactions with edge devices in Kubernetes through this informative conference talk. Delve into the challenges of orchestrating workloads on edge devices, including security concerns and authentication mechanisms for leaf devices. Learn how to dynamically bridge leaf devices to a cluster and determine the authenticity of newly discovered devices at scale. Discover enhancements made to Akri, a CNCF sandbox project, for integrating Kubernetes secrets and secret stores to uniquely identify devices in a cluster. Gain insights on connecting edge devices securely and restricting resource access based on customizable criteria, making it accessible even for Kubernetes newcomers.
Syllabus
Can You Keep a Secret? Securely Interacting with Edge Devices i... Adithya Jayachandran & Yu Jin Kim
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Access Control Concepts(ISC)² via Coursera AZ-303 Part 2 - Implement Management and Security Solutions in Azure
A Cloud Guru Google Cloud Identity and Access Management (IAM) Deep Dive
A Cloud Guru Google Kubernetes Engine Deep Dive
A Cloud Guru HashiCorp Vault
A Cloud Guru