YoVDO

Implementing an Auditable Access Control Strategy Using Cluster Certificate Authority Rotation

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Courses Access Control Courses Auditing Courses Cluster Administration Courses Cluster Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive strategy for implementing auditable access control in Kubernetes clusters through certificate authority rotation. Learn how to address staff changes and credential exposures by enforcing a robust approach to revoking and renewing cluster access. Discover the importance of rotating cluster certificate authorities and downstream certificates for effective access management. Gain insights into zero-downtime rotation techniques for critical cluster components, including node kubelet client and server certificates, and cluster administrator certificates. Understand the process of CA cross-signing and its role in maintaining cluster availability during rotations. Follow a visual walkthrough of the workflow, observing how certificates for crucial cluster components evolve throughout the rotation process. Examine the benefits of cross-signing in enabling seamless rotations without disrupting existing cluster components. Finally, learn how to grant new access to the cluster once the rotation process is complete, ensuring a secure and auditable access control strategy for your Kubernetes environment.

Syllabus

Implementing an Auditable Access Control Strategy Using Cluster... - Tyler Lisowski & Kodie Glosser


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Computing, Storage and Security with Google Cloud Platform
Google via Coursera