From the course: Kubernetes and Cloud Native Security Associate (KCSA) Cert Prep
What is cloud native security?
From the course: Kubernetes and Cloud Native Security Associate (KCSA) Cert Prep
What is cloud native security?
Now, before we dive deeper into the idea of the KCSA and overall Kubernetes security, I want to just point something out that I believe is important. From a cloud perspective, even though the cert has cloud native in its name, cloud native security may not just mean the cloud. Now, when I think of examples, my head automatically goes to hybrid environments. So with platforms like Azure Stack, HCI, Google Anthos, EKS Anywhere, AWS Outposts, a lot of cloud providers are bringing cloud native to the data center. There's not going to be anything about this on the exam, but I do believe it's a valuable piece of information to point out. It's no longer really just thinking about the cloud when it comes to cloud native, but thinking about security as a whole, which we're going to be going through in this course. But really just think about the idea of expanding the cloud to not just cloud. So again, an example here is let's say Azure Stack HCI. So what Azure Stack HCI allows you to do is it allows you to run Kubernetes, for example, but specifically Azure Kubernetes Service or AKS in your data center. Now what do I mean by that? What I mean is you'll literally get a box, a server, you'll pop it into your data center, and when you log into it, it's like you're logging into Azure. So this whole idea of cloud native environments, cloud native applications aren't just in the cloud, they are quite literally anywhere and anywhere. It's all depending on how you design your application. So when you think about cloud native security, don't just think in the cloud, think hybrid.
Contents
-
-
-
What is cloud native security?1m 52s
-
OWASP Kubernetes Top 102m 7s
-
(Locked)
What is infrastructure security?1m 26s
-
(Locked)
The four Cs of cloud native security3m 29s
-
(Locked)
Cloud provider and infrastructure security4m
-
(Locked)
Isolation techniques1m 42s
-
(Locked)
Artifact repo and image security1m 39s
-
(Locked)
Workload and app code security4m 38s
-
-
-
-
-
-
-