Securing Compute Services – Containers and Kubernetes
In the previous chapter, we learned about security in VMs.
This chapter will cover containers and Kubernetes-managed services and provide you with best practices on how to securely deploy and manage each of them.
In this chapter, we will cover the following topics:
- Best practices for securing Kubernetes workloads (identity and access management, network access, auditing and security monitoring, and compliance)
- Best practices for securing non-Kubernetes workloads (identity and access management, network access, and auditing and monitoring)