YoVDO

Focused on Security Measures in Kubernetes Environment

Offered By: Linux Foundation via YouTube

Tags

Kubernetes Courses Cloud Computing Courses Encryption Courses Container Orchestration Courses Vulnerability Scanning Courses GitOps Courses Secret Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore security measures in Kubernetes environments through this conference talk by Hiroki Akiba from OGIS-RI Co.,Ltd. Delve into the shared responsibility model of major cloud vendors and examine choices for using Kubernetes environments. Learn about security and compliance within the CNCF landscape, focusing on crucial aspects such as firewalls, encryption, and secret management. Discover usage examples of sealed-secrets and techniques for managing secret values. Investigate backup strategies for Kubernetes runtime resources and the implementation of GitOps for resource management. Gain insights into vulnerability checking throughout the container lifecycle, including considerations for clusters, nodes, and containers in various phases. Examine Pod Security Policy settings and explore the three pillars of observability. Familiarize yourself with the CNCF End User Technology Radar and governance/compliance tools like Falco. This comprehensive overview equips you with essential knowledge to enhance security in Kubernetes deployments.

Syllabus

Intro
Shared responsibility model of major cloud vendor
Choises to use kubernetes environment (e. 9. ANS)
Mopped to a shared responsibility model (e. 9. ANS) • ARS and user responsibility for security when running container.
Security & Compliance of CNCF Landscape
Points to consider for kubernetes security
Firewall • Control network communication between each component.
Encryption
Secret management
Usage example of sealed-secrets
How to management secret values
Backup of runtime resource of kubernetes
Managing kubernetes resouces with GitOps
Vulnerability checking throughout the container life cycle
Vulnerability considerations for cluster and node
Vulnerability check of build and ship phase
Vulnerability considerations for container of run phoze
Introducing some setting of Pod Security Policy
Vulnerability check of run phase
The three pillars of observability
The CNCF End User Technology Radar
Governance / Compliance
Introducing Falco
Conclusion


Taught by

Linux Foundation

Tags

Related Courses

A Beginner’s Guide to Docker
Packt via FutureLearn
A Beginner's Guide to Kubernetes for Container Orchestration
Packt via FutureLearn
A Practical Guide to Amazon EKS
A Cloud Guru
Advanced Networking with Kubernetes on AWS
A Cloud Guru
AIOps Essentials (Autoscaling Kubernetes with Prometheus Metrics)
A Cloud Guru