Hacking Kubernetes : threat-driven analysis and defense /
Martin, Andrew (Of Control Plane),
Hacking Kubernetes : threat-driven analysis and defense / Andrew Martin and Michael Hausenblas - xiv, 295 pages : illustrations ; 24 cm
Includes bibliographical references and index.
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share best-practice configuration to help you harden clusters from possible angles of attack. This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system. - -
9781492081739 1492081736
2022277427
GBC1F7727 bnb
020334186 Uk
Open source software--Security measures.
Application software--Security measures.
Telecommunication.
Telecommunications
Logiciels libres--Sécurité--Mesures.
Logiciels d'application--Sécurité--Mesures.
Télécommunications.
telecommunications.
Telecommunication.
QA76.76.A65 / M35 2022
005.3
Hacking Kubernetes : threat-driven analysis and defense / Andrew Martin and Michael Hausenblas - xiv, 295 pages : illustrations ; 24 cm
Includes bibliographical references and index.
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share best-practice configuration to help you harden clusters from possible angles of attack. This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system. - -
9781492081739 1492081736
2022277427
GBC1F7727 bnb
020334186 Uk
Open source software--Security measures.
Application software--Security measures.
Telecommunication.
Telecommunications
Logiciels libres--Sécurité--Mesures.
Logiciels d'application--Sécurité--Mesures.
Télécommunications.
telecommunications.
Telecommunication.
QA76.76.A65 / M35 2022
005.3