Most discussions of Kubernetes® security focus on how challenging it is to secure a cluster. Kubernetes offers only a handful of native security features, we’re told, which makes it exceedingly difficult to secure every layer of a Kubernetes environment.
This e-book explains how to design a security strategy that reinforces, rather than hinders, the rest of your Kubernetes-based processes. It identifies Kubernetes security challenges from the node up and pinpoints specific solutions for addressing each of them, with a focus on automated, scalable approaches that will keep Kubernetes-based workloads secure, no matter how large your cluster is or which type of infrastructure you use to host it—on-premises, public cloud, or managed service.