Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen
Haben Sie Fragen? Einfach anrufen, wir helfen gerne: Tel. 089/210233-0
oder besuchen Sie unser Ladengeschäft in der Pacellistraße 5 (Maxburg) 80333 München
+++ Versandkostenfreie Lieferung innerhalb Deutschlands
Haben Sie Fragen? Tel. 089/210233-0

Learning Kubernetes Security - Second Edition

51,20 €*

Versandkostenfrei

Produktnummer: 16A63078568
Autor: Lapaz, Raul
Veröffentlichungsdatum: 30.06.2025
EAN: 9781835886380
Auflage: 002
Sprache: Englisch
Seitenzahl: 390
Produktart: Kartoniert / Broschiert
Verlag: Packt Publishing
Untertitel: A practical guide for secure and scalable containerized environments
Produktinformationen "Learning Kubernetes Security - Second Edition"
Get practical, hands-on experience in Kubernetes security-from mastering the fundamentals to implementing advanced techniques to safeguard your Kubernetes deployments against malicious threats Key Features: - Understand Kubernetes security fundamentals through real-world examples of threat actor tactics - Navigate the complexities of securing container orchestration with practical, expert insights - Deploy multiple Kubernetes components, plugins, and third-party tools to proactively defend against cyberattacks - Purchase of the print or Kindle book includes a free PDF eBook Book Description: With readily available services, support, and tools, Kubernetes has become a foundation for digital transformation and cloud-native development, but it brings significant security challenges such as breaches and supply chain attacks. This updated edition equips you with defense strategies to protect your applications and infrastructure while understanding the attacker mindset, including tactics like container escapes and exploiting vulnerabilities to compromise clusters. The author distills his 25+ years of experience to guide you through Kubernetes components, architecture, and networking, addressing authentication, authorization, image scanning, resource monitoring, and traffic sniffing. You'll implement security controls using third-party plugins (krew) and tools like Falco, Tetragon, and Cilium. You'll also secure core components, such as the kube-apiserver, CoreDNS, and kubelet, while hardening images, managing security contexts, and applying PodSecurityPolicy. Through practical examples, the book teaches advanced techniques like redirecting traffic from misconfigured clusters to rogue pods and enhances your support incident response with effective cluster monitoring and log analysis. By the end of the book, you'll have a solid grasp of container security as well as the skills to defend your clusters against evolving threats. What You Will Learn: - Implement Kubernetes security best practices, from threat detection to network protection - Build strong security layers and controls using core Kubernetes components - Apply theory through hands-on labs to secure Kubernetes systems step by step - Use security plugins and open-source tools to help mitigate container-based threats - Set up monitoring and logging to quickly detect and respond to cybersecurity threats - Analyze attacker tactics to build stronger cluster defense strategies Who this book is for: This book is for DevOps and Platform teams managing Kubernetes environments. As security is a shared responsibility, it also addresses on-premises and cloud security professionals, as well as beginner and advanced incident responders. No expert knowledge is required; a basic tech background is all you need as this book covers Kubernetes fundamentals and security principles, delivering practical insights for anyone looking to stay current with modern tech and strengthen their security skills. Table of Contents - Kubernetes Architecture - Kubernetes Networking - Threat Modeling - Applying the Principle of Least Privilege in Kubernetes - Configuring Kubernetes Security Boundaries - Securing Cluster Components - Authentication, Authorization, and Admission Control - Securing Pods - Shift Left (Scanning, SBOM, and CI/CD) - Real-Time Monitoring and Observability - Security Monitoring and Log Analysis - Defense in Depth - Kubernetes Vulnerabilities and Container Escapes - Third-Party Plugins for Securing Kubernetes
Bücherregal gefüllt mit juristischen Werken

Sie möchten lieber vor Ort einkaufen?

Sie haben Fragen zu diesem oder anderen Produkten oder möchten einfach gerne analog im Laden stöbern? Wir sind gerne für Sie da und beraten Sie auch telefonisch.

Juristische Fachbuchhandlung
Georg Blendl

Parcellistraße 5 (Maxburg)
8033 München

Montag - Freitag: 8:15 -18 Uhr
Samstags geschlossen