YoVDO

How to Secure Your Node.js Containers on Kubernetes With Best Practices

Offered By: JavaScript Conferences by GitNation via YouTube

Tags

Conference Talks Courses Node.Js Courses OpenID Connect (OIDC) Courses Infrastructure Security Courses Kubernetes Security Courses RBAC Courses Container Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover essential security best practices for deploying Node.js containers on Kubernetes in this informative conference talk from DevOps.js Conference 2022. Learn how to secure your cluster, implement OIDC for access control, and protect your Node.js applications running on Kubernetes. Explore topics such as RBAC implementation, OpenID Connect usage, secrets management, and keeping Kubernetes versions up-to-date. Gain insights on restricting access to critical components, controlling inter-pod traffic, utilizing namespaces for workload isolation, and implementing resource limits. Delve into infrastructure best practices, including running containers with non-root privileges, using minimal up-to-date official base images, preventing unwanted kernel module loading, and enabling container image scanning in CI/CD pipelines. Master the art of auditing images, leveraging pod security policies, and addressing Node.js-specific security concerns to enhance the overall security posture of your Kubernetes environment.

Syllabus

Intro
Kubernetes Security
Use RBAC
Use OpenID Connect
Use Secrets
Keep Kubernetes version up to date
Restrict kubelet, API, and SSH access
Control traffic between pods and clusters
Use namespaces to isolate workloads
Limit resource usages
Use monitoring tools and enable audit logging
Infrastructure best practices
Do not run containers as root
Use minimal up-to-date official base images
Prevent loading unwanted kernel modules
Enable container image scanning in your CI/CD phase
Audit images
Use pod security policies
Node.js specific


Taught by

JavaScript Conferences by GitNation

Related Courses

Microsoft Azure Developer: Implement User Authentication and Authorization
Pluralsight
Building Authorization in Azure Active Directory for Developers
Pluralsight
Configuring Virtual Machines in Microsoft Azure
Pluralsight
Microsoft Azure Security Engineer: Configure Secure Access Using Azure AD
Pluralsight
Managing and Monitoring Access on AWS
Pluralsight