Book description
Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to adopt a holistic security and observability strategy for building and securing cloud native applications running on Kubernetes.
Whether you're already working on cloud native applications or are in the process of migrating to its architecture, this guide introduces key security and observability concepts and best practices to help you unleash the power of cloud native applications. Authors Brendan Creane and Amit Gupta from Tigera take you through the full breadth of new cloud native approaches for establishing security and observability for applications running on Kubernetes.
- Learn why you need a security and observability strategy for cloud native applications and determine your scope of coverage
- Understand key concepts behind the book's security and observability approach
- Explore the technology choices available to support this strategy
- Discover how to share security responsibilities across multiple teams or roles
- Learn how to architect Kubernetes security and observability for multicloud and hybrid environments
Publisher resources
Table of contents
- Preface
- 1. Security and Observability Strategy
- 2. Infrastructure Security
- 3. Workload Deployment Controls
- 4. Workload Runtime Security
- 5. Observability
- 6. Observability and Security
- 7. Network Policy
- 8. Managing Trust Across Teams
- 9. Exposing Services to External Clients
- 10. Encryption of Data in Transit
- 11. Threat Defense and Intrusion Detection
- Conclusion
- Index
- About the Authors
Product information
- Title: Kubernetes Security and Observability
- Author(s):
- Release date: October 2021
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098107109
You might also like
book
Kubernetes Security
Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as …
book
Learn Kubernetes Security
Secure your container environment against cyberattacks and deliver robust deployments with this practical guide Key Features …
video
Kubernetes Security: Attacking and Defending Kubernetes
Like many complex systems Kubernetes has historically been insecure by default, and contains a number of …
book
Core Kubernetes
Take a deep dive into Kubernetes inner components and discover what really powers a Kubernetes cluster. …