Home
»
Hacking Kubernetes
A01=Andrew Martin
A01=Michael Hausenblas
Age Group_Uncategorized
Age Group_Uncategorized
Author_Andrew Martin
Author_Michael Hausenblas
automatic-update
Category1=Non-Fiction
Category=UTC
COP=United States
Delivery_Delivery within 10-20 working days
eq_bestseller
eq_computing
eq_isMigrated=2
eq_nobargain
eq_non-fiction
Format=BC
Format_Paperback
Kubernetes security cloud native security
Language_English
PA=Available
Price_€50 to €100
PS=Active
softlaunch
Product details
- ISBN 9781492081739
- Format: Paperback
- Dimensions: 178 x 232mm
- Publication Date: 26 Oct 2021
- Publisher: O'Reilly Media
- Publication City/Country: US
- Product Form: Paperback
- Language: English
Delivery/Collection within 10-20 working days
Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock
10-20 Working Days: On Backorder
Will Deliver When Available: On Pre-Order or Reprinting
We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share best-practice configuration to help you harden clusters from possible angles of attack.
This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system.
Understand where your Kubernetes system is vulnerable with threat modelling techniques
Focus on pods, from configurations to attacks and defenses
Secure your cluster and workload traffic
Define and enforce policy with RBAC, OPA, and Kyverno
Dive deep into sandboxing and isolation techniques
Learn how to detect and mitigate supply chain attacks
Explore filesystems, volumes, and sensitive information at rest
Discover what can go wrong when running multitenant workloads in a cluster
Learn what you can do if someone breaks in despite you having controls in place
Qty:
