Главная
Study mode:
on
1
Intro
2
Layers
3
Hardening
4
Cluster configuration
5
Static code analysis
6
Container image scanning
7
Software bill of materials (SBOM)
8
SBOM monitoring
9
Policy enforcement
10
Resource limits
11
Monitor behavior
12
Key takeaways
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore essential strategies for securing Kubernetes clusters in this 45-minute conference talk from All Things Open 2022. Learn about multi-layered security approaches, including hardening nodes, securing workloads, and inspecting containers for vulnerabilities. Discover open-source tools for identifying issues at each layer, from cluster configuration and static code analysis to container image scanning and software bill of materials (SBOM) monitoring. Gain insights into policy enforcement, resource limits, and behavior monitoring to build and maintain a secure Kubernetes environment. Walk away with key takeaways to enhance your organization's container and Kubernetes security practices.

Keeping Your Kubernetes Cluster Secure

All Things Open
Add to list