YoVDO

Can You Keep a Secret? Securely Interacting with Edge Devices in Kubernetes

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Edge Computing Courses Kubernetes Courses Access Control Courses Secret Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore secure interactions with edge devices in Kubernetes through this informative conference talk. Delve into the challenges of orchestrating workloads on edge devices, including security concerns and authentication mechanisms for leaf devices. Learn how to dynamically bridge leaf devices to a cluster and determine the authenticity of newly discovered devices at scale. Discover enhancements made to Akri, a CNCF sandbox project, for integrating Kubernetes secrets and secret stores to uniquely identify devices in a cluster. Gain insights on connecting edge devices securely and restricting resource access based on customizable criteria, making it accessible even for Kubernetes newcomers.

Syllabus

Can You Keep a Secret? Securely Interacting with Edge Devices i... Adithya Jayachandran & Yu Jin Kim


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Continuous Delivery and DevOps with TFS and VSTS 2018, Managing Builds
Pluralsight
DevSecOps: Building a Secure Continuous Delivery Pipeline
LinkedIn Learning
Microsoft DevOps Solutions: Designing a Sensitive Information Strategy
Pluralsight
Microsoft Azure DevOps Engineer: Implement a Secure and Compliant Development Process
Pluralsight
Linux Administration with Ansible: Advanced Ansible Automation
Pluralsight