|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
OR_on1370894023 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
230221s2023 nyua ob 001 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d EBLCP
|d UKAHL
|d N$T
|d OCLCO
|
019 |
|
|
|a 1370497920
|a 1376833841
|
020 |
|
|
|a 9781617298912
|q (electronic bk.)
|
020 |
|
|
|a 1617298913
|q (electronic bk.)
|
020 |
|
|
|z 1617298913
|
020 |
|
|
|a 9781638351771
|
020 |
|
|
|a 1638351775
|
029 |
1 |
|
|a AU@
|b 000074211913
|
035 |
|
|
|a (OCoLC)1370894023
|z (OCoLC)1370497920
|z (OCoLC)1376833841
|
037 |
|
|
|a 9781617298912
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.76.S46
|
082 |
0 |
4 |
|a 005.1/12
|2 23/eng/20230221
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Soto Bueno, Alex,
|e author.
|
245 |
1 |
0 |
|a Kubernetes secrets management /
|c Alex Soto Bueno, Andrew Block.
|
264 |
|
1 |
|a Shelter Island, NY :
|b Manning Publications Co.,
|c [2023]
|
300 |
|
|
|a 1 online resource (xix, 226 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Safely manage your secret information like passwords, keys, and certificates in Kubernetes. This practical guide is full of best practices and methods for adding layers of security that will defend the critical data of your applications. Secrets, like database passwords and API keys, are some of the most important data in your application. Kubernetes Secrets Management reveals how to store these sensitive assets in Kubernetes in a way that’s protected against leaks and hacks. You’ll learn the default capabilities of Kubernetes secrets, where they’re lacking, and alternative options to strengthen applications and infrastructure. Discover a security-first mindset that is vital for storing and using secrets correctly, and tools and concepts that will help you manage sensitive assets such as certificates, keys, and key rotation. Kubernetes Secrets Management reveals security best practices and reliable third-party tools for protecting sensitive data in Kubernetes-based systems. In this focused guide, you’ll explore relevant, real-world examples like protecting secrets in a code repository, securing keys with HashiCorp Vault, and adding layers to maintain protection after a breach. Along the way, you’ll pick up secrets management techniques you can use outside Kubernetes, as well.
|
588 |
|
|
|a Description based on print version record.
|
505 |
0 |
|
|a Intro -- inside front cover -- Kubernetes Secrets Management -- Copyright -- dedication -- brief contents -- contents -- front matter -- preface -- acknowledgments -- about this book -- Who should read this book? -- How this book is organized: A roadmap -- About the code -- liveBook discussion forum -- about the authors -- about the cover illustration -- Part 1. Secrets and Kubernetes -- 1 Kubernetes Secrets -- 1.1 A focus on security -- 1.2 Taking full advantage of the Kubernetes ecosystem -- 1.3 Not everything is a Secret -- 1.4 Bringing secrets management and Kubernetes together
|
505 |
8 |
|
|a 1.5 Tools to get started -- Summary -- 2 An introduction to Kubernetes and Secrets -- 2.1 Kubernetes architecture -- 2.1.1 What is a master Node? -- 2.1.2 What is a worker Node? -- 2.2 Deploying workloads in Kubernetes -- 2.2.1 Deploying a workload -- 2.2.2 Deployment objects -- 2.2.3 Volume -- 2.3 Managing application configuration -- 2.3.1 ConfigMaps -- 2.4 Using Kubernetes Secrets to store sensitive information -- 2.4.1 Secrets are encoded in Base64 -- 2.4.2 Secrets are mounted in a temporary file system -- 2.4.3 Secrets can be encrypted at rest -- 2.4.4 Risks -- Summary
|
505 |
8 |
|
|a Part 2. Managing Secrets -- 3 Securely storing Secrets -- 3.1 Storing Kubernetes manifests at rest -- 3.1.1 Capturing resources for declarative configuration -- 3.2 Tools for securely storing Kubernetes resources -- 3.2.1 Ansible Vault -- 3.3 Kubernetes Operators -- 3.3.1 Custom resource definitions (CRDs) -- 3.3.2 Sealed Secrets -- 3.4 Managing Secrets within Kubernetes package managers -- 3.4.1 Deploying the Greeting Demo Helm chart -- 3.4.2 Using Helm Secrets -- 3.5 Rotating secrets -- 3.5.1 Ansible Vault secret key rotation -- 3.5.2 Sealed Secrets key rotation
|
505 |
8 |
|
|a 3.5.3 SOPS secret key rotation -- Summary -- 4 Encrypting data at rest -- 4.1 Encrypting secrets in Kubernetes -- 4.1.1 Data at rest vs. data in motion -- 4.1.2 Plain secrets -- 4.1.3 Encrypting secrets -- 4.1.4 Creating the secret -- 4.2 Key management server -- 4.2.1 Kubernetes and KMS provider -- 4.2.2 Creating the secret -- Summary -- 5 HashiCorp Vault and Kubernetes -- 5.1 Managing application secrets using HashiCorp Vault -- 5.1.1 Deploying Vault to Kubernetes -- 5.1.2 Deploying an application to access Vault -- 5.2 Kubernetes auth method -- 5.2.1 Configuring Kubernetes auth
|
505 |
8 |
|
|a 5.2.2 Testing and validating Kubernetes auth -- 5.3 The Vault Agent Injector -- 5.3.1 Configurations to support Kubernetes Vault Agent injection -- Summary -- 6 Accessing cloud secrets stores -- 6.1 The Container Storage Interface and Secrets Store CSI Driver -- 6.1.1 Container Storage Interface -- 6.1.2 Container Storage Interface and Kubernetes -- 6.1.3 CSI and secrets -- 6.1.4 Installing prerequisites -- 6.1.5 Installing the Secrets Store CSI Driver -- 6.1.6 Consuming HashiCorp Vault secrets via the Secrets Store CSI Driver and the HashiCorp Vault provider
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Kubernetes.
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Logiciels d'application
|x Développement.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Application software
|x Development
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Soto Bueno, Alex.
|t Kubernetes secrets management.
|d Shelter Island, NY : Manning Publications Co., [2023]
|z 9781617298912
|w (DLC) 2022467008
|w (OCoLC)1368218342
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781617298912/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH41245655
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL7194223
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3503301
|
994 |
|
|
|a 92
|b IZTAP
|