Cargando…

Kubernetes security : attacking and defending Kubernetes /

Like many complex systems Kubernetes has historically been insecure by default, and contains a number of “footguns” that make secure deployments difficult. Segregation of duty, least privilege, and a rigorous Continuous Security approach are the foundations of any secure system—however these become...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Sebastopol, California] : O'Reilly Media, Inc., [2021]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1322464977
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 220602s2021 cau166 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF 
024 8 |a 0636920668794 
029 1 |a AU@  |b 000072055574 
035 |a (OCoLC)1322464977 
037 |a 0636920668794  |b O'Reilly Media 
050 4 |a QA76.76.D47 
082 0 4 |a 005.3  |2 23/eng/20220602 
049 |a UAMI 
245 0 0 |a Kubernetes security :  |b attacking and defending Kubernetes /  |c Andrew Martin. 
250 |a [First edition]. 
264 1 |a [Sebastopol, California] :  |b O'Reilly Media, Inc.,  |c [2021] 
300 |a 1 online resource (1 video file (2 hr., 46 min.)) :  |b sound, color. 
306 |a 024600 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Andrew Martin, presenter. 
520 |a Like many complex systems Kubernetes has historically been insecure by default, and contains a number of “footguns” that make secure deployments difficult. Segregation of duty, least privilege, and a rigorous Continuous Security approach are the foundations of any secure system—however these become more difficult to achieve in distributed systems with many moving parts. But all is not lost! With an understanding of the foundational layers and principles including micro-segmentation, zero trust, and local PKI, Kubernetes can be secured against the most ardent of attackers. The course guides attendees through an introduction to Linux container security, and progresses to advanced Kubernetes cluster security. It emphasizes pragmatic threat modelling and risk assessment based on an understanding of the tools and primitives available. 
588 0 |a Online resource; title from title details screen (O’Reilly, viewed June 2, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Application software  |x Development  |x Computer programs. 
650 0 |a Computer security. 
650 0 |a Application program interfaces (Computer software) 
650 0 |a Cloud computing. 
650 7 |a Application program interfaces (Computer software)  |2 fast  |0 (OCoLC)fst00811704 
650 7 |a Application software  |x Development  |x Computer programs.  |2 fast  |0 (OCoLC)fst00811708 
650 7 |a Cloud computing.  |2 fast  |0 (OCoLC)fst01745899 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
655 7 |a Instructional films.  |2 fast  |0 (OCoLC)fst01726236 
655 7 |a Internet videos.  |2 fast  |0 (OCoLC)fst01750214 
655 7 |a Nonfiction films.  |2 fast  |0 (OCoLC)fst01710269 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
700 1 |a Martin, Andrew,  |e presenter. 
710 2 |a O'Reilly (Firm),  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/0636920668794/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP