-
Book Overview & Buying
-
Table Of Contents
Learning Kubernetes Security - Second Edition
By :
It is a good practice to find defects and vulnerabilities in the early stages of the development life cycle. Identifying issues and fixing them in the early stages helps improve the robustness and stability of an application. It also helps to reduce the attack surface in the production environment. The process of securing Kubernetes clusters must cover the entire DevOps flow because modern applications are not just deployed into Kubernetes; they are built, tested, packaged, and managed through a complex CI/CD pipeline process. Similar to hardening container images and restricting powerful security attributes in the workload manifest, image scanning can help improve the security posture on the development side. However, image scanning can definitely go beyond that.
In this chapter, first, we will introduce the concept of image scanning and vulnerabilities; then, we’ll talk about a popular open source image scanning tool called Trivy...