Kubernetes Security Pratices
In this video I talk about a super important topic, which is security in Kubernetes and what are some of the best practices for securing your Kubernetes cluster.
The big challenge that we see in terms of Kubernetes security is that it’s already so challenging to set up a Kubernetes cluster and to configure it to deploy the applications in it, that security often becomes the afterthought, adding on top of that already complex configuration. However we can’t deny the importance of security, especially when the systems are so complex!
Cloud applications actually become a very attractive target to a lot of hackers and this growing number of cloud native applications mostly use Kubernetes as a platform and that’s where the relevance of knowing how to secure Kubernetes clusters comes into play.
▬▬▬▬▬▬ T I M E S T A M P S ⏰ ▬▬▬▬▬▬
- 0:00 - Intro
- 00:33 - Security in Cloud in general
- 01:39 - Security in Kubernetes
- 02:26 - Security as a Spectrum
- 04:39 - BP 1 - Image Scanning
- 09:45 - BP 2 - Run as Non-Root User
- 11:08 - BP 3 - Users & Permissions with RBAC
- 15:44 - BP 4 - Use Network Policies
- 18:18 - BP 5 - Encrypt Communication
- 19:06 - BP 6 - Secure Secret Data
- 20:34 - BP 7 - Secure etcd
- 22:05 - BP 8 - Automated Backup & Restore
- 24:54 - BP 9 - Configure Security Policies
- 26:50 - BP 10 - Disaster Recovery