Cloud Native - Examining Pod Security Admission
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore the intricacies of Pod Security Admission in this 55-minute CNCF conference talk. Delve into the Baseline Profile, examine the Admission Configuration File, and weigh the pros and cons of various security approaches. Learn about audit logs, caverno comparison, and privileged namespaces. Discover practical use cases and gain insights on enforcing baseline security with caverno. Conclude with key takeaways and a Q&A session to deepen your understanding of Kubernetes pod security.
Syllabus
Intro
Overview
Pod Security Admission
Baseline Profile
Admission Configuration File
Pros
Cons
No enforcement
Audit logs
caverno comparison
caverno cons
use cases
caverno
privileged
Privileged namespaces
Enforce baseline with caverno
Closing points
Questions
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Introduction to Cloud Infrastructure TechnologiesLinux Foundation via edX Scalable Microservices with Kubernetes
Google via Udacity Google Cloud Fundamentals: Core Infrastructure
Google via Coursera Introduction to Kubernetes
Linux Foundation via edX Fundamentals of Containers, Kubernetes, and Red Hat OpenShift
Red Hat via edX