没有合适的资源?快使用搜索试试~ 我知道了~
首页Kubernetes Security - Liz Rice.pdf
Kubernetes Security - Liz Rice.pdf
需积分: 19 105 浏览量
更新于2023-05-25
评论
收藏 5.7MB PDF 举报
文档名称,Kubernetes Security - Liz Rice.pdf Chapter1-8 xxxxxxxxxxxxxxxxxxx
资源详情
资源评论
资源推荐

Liz Rice & Michael Hausenblas
Operating Kubernetes Clusters
and Applications Safely
Kubernetes
Security
C
o
m
pl
i
m
e
nts of

Building and managing secure Kubernetes clusters is a complex task. Aqua Security
provides a complete solution that leverages native Kubernetes capabilities, makes it easy
to establish policy-driven monitoring and enforcement, and further secures Kubernetes
deployments with runtime protection and compliance controls at the cluster, namespace,
node, pod and container levels.
Aqua Security is the company behind open-source tools that enable you to improve
the security of your Kubernetes cluster:
www.aquasec.com
Learn more
Enhances
Native Kubernetes Security Controls
Protects
Applications in Runtime
Provides Visibility
For Compliance
Secures
The Build Pipeline
Penetration testing tool that “attacks”
your cluster and nodes, looking for
conguration issues.
github.com/aquasecurity/kube-hunter
Check your cluster against 100+ tests
of the CIS Kubernetes Benchmark so you
can harden it according to best practices.
github.com/aquasecurity/kube-bench
Full Lifecycle Security
For Containers and
Cloud Native Applications

Liz Rice and Michael Hausenblas
Kubernetes Security
Operating Kubernetes Clusters and
Applications Safely
Boston Farnham Sebastopol
Tokyo
Beijing Boston Farnham Sebastopol
Tokyo
Beijing

978-1-492-04600-4
[LSI]
Kubernetes Security
by Liz Rice and Michael Hausenblas
Copyright © 2018 O’Reilly Media. All rights reserved.
Printed in the United States of America.
Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA
95472.
O’Reilly books may be purchased for educational, business, or sales promotional use.
Online editions are also available for most titles (http://oreilly.com/safari). For more
information, contact our corporate/institutional sales department: 800-998-9938 or
corporate@oreilly.com.
Acquisitions Editor: Nikki McDonald
Development Editor: Virginia Wilson
Production Editor: Justin Billing
Copyeditor: Sharon Wilkey
Proofreader: Chris Edwards
Interior Designer: David Futato
Cover Designer: Karen Montgomery
Illustrator: Rebecca Demarest
October 2018:
First Edition
Revision History for the First Edition
2018-09-28: First Release
The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Kubernetes Secu‐
rity, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc.
The views expressed in this work are those of the authors, and do not represent the
publisher’s views. While the publisher and the authors have used good faith efforts
to ensure that the information and instructions contained in this work are accurate,
the publisher and the authors disclaim all responsibility for errors or omissions,
including without limitation responsibility for damages resulting from the use of or
reliance on this work. Use of the information and instructions contained in this
work is at your own risk. If any code samples or other technology this work contains
or describes is subject to open source licenses or the intellectual property rights of
others, it is your responsibility to ensure that your use thereof complies with such
licenses and/or rights.
This work is part of a collaboration between O’Reilly and Aqua Security Software.
See our statement of editorial independence.

Table of Contents
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
1.
Approaching Kubernetes Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Security Principles 3
2.
Securing the Cluster. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
API Server 7
Kubelet 9
Running etcd Safely 11
Kubernetes Dashboard 12
Validating the Configuration 13
3.
Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Identity 15
Authentication Concepts 20
Authentication Strategies 21
Tooling and Good Practices 22
4.
Authorization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Authorization Concepts 25
Authorization Modes 26
Access Control with RBAC 27
Tooling and Good Practices 32
5.
Securing Your Container Images. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Scanning Container Images 36
Patching Container Images 36
iii
剩余84页未读,继续阅读



安全验证
文档复制为VIP权益,开通VIP直接复制

评论0