Cargando…

Zero trust architecture in Kubernetes /

Zero trust is a security framework that relies on authenticating, authorizing, and continuously validating access for every transaction. For organizations that use Kubernetes to develop and deliver applications, zero trust is the only practical way to keep your systems safe from potential external a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Crawley, Kim (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, Inc., 2022.
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1350746528
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 221114s2022 cau o 000 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF 
020 |z 9781098138639 
029 1 |a AU@  |b 000072937709 
035 |a (OCoLC)1350746528 
037 |a 9781098138646  |b O'Reilly Media 
050 4 |a QA76.76.S58 
082 0 4 |a 005.1/12  |2 23/eng/20221114 
049 |a UAMI 
100 1 |a Crawley, Kim,  |e author. 
245 1 0 |a Zero trust architecture in Kubernetes /  |c Kim Crawley. 
250 |a First edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media, Inc.,  |c 2022. 
300 |a 1 online resource (50 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Zero trust is a security framework that relies on authenticating, authorizing, and continuously validating access for every transaction. For organizations that use Kubernetes to develop and deliver applications, zero trust is the only practical way to keep your systems safe from potential external and internal threats. This insightful report provides a high-level overview of what zero trust in Kubernetes looks like and why it's so important. Author Kim Crawley explains considerations specific to Kubernetes and describes best practices for implementing a zero trust model. With this architecture, all components in your Kubernetes system will be secured by default; no endpoint, server, application, or service will interact with anything else without proper authentication, authorization, and nonrepudiation. You'll learn how to: Secure computer systems with effective authentication and authorization functionality Use integrity verification to secure Kubernetes applications in zero trust architecture Create an observable state in your Kubernetes network for robust security monitoring Establish an effective zero trust architecture to run Kubernetes Initiate time management in a Kubernetes implementation Apply role-based access control to your Kubernetes network Establish end-to-end encryption for zero trust security Explore effective zero trust security scenarios with Kubernetes. 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed November 14, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Kubernetes. 
650 0 |a Modular programming  |x Computer programs. 
650 0 |a Global software development  |x Computer programs. 
650 0 |a Open source software. 
650 0 |a Component software. 
650 7 |a Component software.  |2 fast  |0 (OCoLC)fst00871617 
650 7 |a Open source software.  |2 fast  |0 (OCoLC)fst01046097 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781098138646/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP