From the course: Kubernetes and Cloud Native Security Associate (KCSA) Cert Prep
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Isolation techniques
From the course: Kubernetes and Cloud Native Security Associate (KCSA) Cert Prep
Isolation techniques
All right. So what we're going to do here is we're going to do a quick overview of Kubernetes isolation. And you might hear me say this a few other times in this section. But as we dive into the other sections, we're going to be essentially taking everything that we've learned from this section, Section 1, and diving into it further. So we're going to be talking about namespaces, network policies, policy enforcement, and RBAC. So when it comes to isolation from a Kubernetes perspective, there are three main factors. Well, sorry four; namespaces, network policies, RBAC, and policy enforcement. I don't want to go too far down the rabbit hole right now, but let's do it at a high level. Now, namespaces give you the ability to logically isolate. So for example, App A and Namespace A and App B and Namespace B. However, they don't provide true security as apps can still talk to each other in various namespaces. But what they do do is give the ability to do things like set up network policies…
Contents
-
-
-
What is cloud native security?1m 52s
-
OWASP Kubernetes Top 102m 7s
-
(Locked)
What is infrastructure security?1m 26s
-
(Locked)
The four Cs of cloud native security3m 29s
-
(Locked)
Cloud provider and infrastructure security4m
-
(Locked)
Isolation techniques1m 42s
-
(Locked)
Artifact repo and image security1m 39s
-
(Locked)
Workload and app code security4m 38s
-
-
-
-
-
-
-