Главная
Study mode:
on
1
Introduction
2
About Teleport
3
Why is it important to adapt these tactics
4
RBAC vs Attribute based access control
5
Kubernetes architecture diagram
6
How Teleport helps in visibility of things
7
Favourite feature of Teleport 10
8
Outro
Description:
Explore best practices for avoiding hacks and protecting Kubernetes environments in this 23-minute episode of the Open Source Cafe. Learn about Teleport, the importance of adapting security tactics, and the differences between RBAC and Attribute-based access control. Examine a Kubernetes architecture diagram, discover how Teleport enhances visibility, and hear about the favorite features of Teleport 10. Connect with the host and access additional resources, including Teleport's website, Twitter, and GitHub.

Hacking & Protecting Kubernetes With Teleport

Kunal Kushwaha
Add to list
0:00 / 0:00