-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Learning Kubernetes Security - Second Edition
By :
Learning Kubernetes Security
By:
Overview of this book
With readily available services, support, and tools, Kubernetes has become a foundation for digital transformation and cloud-native development, but it brings significant security challenges such as breaches and supply chain attacks.
This updated edition equips you with defense strategies to protect your applications and infrastructure while understanding the attacker mindset, including tactics like container escapes and exploiting vulnerabilities to compromise clusters. The author distills his 25+ years of experience to guide you through Kubernetes components, architecture, and networking, addressing authentication, authorization, image scanning, resource monitoring, and traffic sniffing. You’ll implement security controls using third-party plugins (krew) and tools like Falco, Tetragon, and Cilium. You’ll also secure core components, such as the kube-apiserver, CoreDNS, and kubelet, while hardening images, managing security contexts, and applying PodSecurityPolicy. Through practical examples, the book teaches advanced techniques like redirecting traffic from misconfigured clusters to rogue pods and enhances your support incident response with effective cluster monitoring and log analysis.
By the end of the book, you'll have a solid grasp of container security as well as the skills to defend your clusters against evolving threats.
Table of Contents (18 chapters)
Preface
Kubernetes Architecture
Kubernetes Networking
Threat Modeling
Applying the Principle of Least Privilege in Kubernetes
Configuring Kubernetes Security Boundaries
Securing Cluster Components
Authentication, Authorization, and Admission Control
Securing Pods
Shift Left (Scanning, SBOM, and CI/CD)
Real-Time Monitoring and Observability
Security Monitoring and Log Analysis
Defense in Depth
Kubernetes Vulnerabilities and Container Escapes
Third-Party Plugins for Securing Kubernetes
Other Books You May Enjoy
Appendix: Enhancements in Kubernetes 1.30–1.33
Customer Reviews