Cargando…

Kubernetes secrets management /

Safely manage your secret information like passwords, keys, and certificates in Kubernetes. This practical guide is full of best practices and methods for adding layers of security that will defend the critical data of your applications. Secrets, like database passwords and API keys, are some of the...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Soto Bueno, Alex (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Shelter Island, NY : Manning Publications Co., [2023]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Intro
  • inside front cover
  • Kubernetes Secrets Management
  • Copyright
  • dedication
  • brief contents
  • contents
  • front matter
  • preface
  • acknowledgments
  • about this book
  • Who should read this book?
  • How this book is organized: A roadmap
  • About the code
  • liveBook discussion forum
  • about the authors
  • about the cover illustration
  • Part 1. Secrets and Kubernetes
  • 1 Kubernetes Secrets
  • 1.1 A focus on security
  • 1.2 Taking full advantage of the Kubernetes ecosystem
  • 1.3 Not everything is a Secret
  • 1.4 Bringing secrets management and Kubernetes together
  • 1.5 Tools to get started
  • Summary
  • 2 An introduction to Kubernetes and Secrets
  • 2.1 Kubernetes architecture
  • 2.1.1 What is a master Node?
  • 2.1.2 What is a worker Node?
  • 2.2 Deploying workloads in Kubernetes
  • 2.2.1 Deploying a workload
  • 2.2.2 Deployment objects
  • 2.2.3 Volume
  • 2.3 Managing application configuration
  • 2.3.1 ConfigMaps
  • 2.4 Using Kubernetes Secrets to store sensitive information
  • 2.4.1 Secrets are encoded in Base64
  • 2.4.2 Secrets are mounted in a temporary file system
  • 2.4.3 Secrets can be encrypted at rest
  • 2.4.4 Risks
  • Summary
  • Part 2. Managing Secrets
  • 3 Securely storing Secrets
  • 3.1 Storing Kubernetes manifests at rest
  • 3.1.1 Capturing resources for declarative configuration
  • 3.2 Tools for securely storing Kubernetes resources
  • 3.2.1 Ansible Vault
  • 3.3 Kubernetes Operators
  • 3.3.1 Custom resource definitions (CRDs)
  • 3.3.2 Sealed Secrets
  • 3.4 Managing Secrets within Kubernetes package managers
  • 3.4.1 Deploying the Greeting Demo Helm chart
  • 3.4.2 Using Helm Secrets
  • 3.5 Rotating secrets
  • 3.5.1 Ansible Vault secret key rotation
  • 3.5.2 Sealed Secrets key rotation
  • 3.5.3 SOPS secret key rotation
  • Summary
  • 4 Encrypting data at rest
  • 4.1 Encrypting secrets in Kubernetes
  • 4.1.1 Data at rest vs. data in motion
  • 4.1.2 Plain secrets
  • 4.1.3 Encrypting secrets
  • 4.1.4 Creating the secret
  • 4.2 Key management server
  • 4.2.1 Kubernetes and KMS provider
  • 4.2.2 Creating the secret
  • Summary
  • 5 HashiCorp Vault and Kubernetes
  • 5.1 Managing application secrets using HashiCorp Vault
  • 5.1.1 Deploying Vault to Kubernetes
  • 5.1.2 Deploying an application to access Vault
  • 5.2 Kubernetes auth method
  • 5.2.1 Configuring Kubernetes auth
  • 5.2.2 Testing and validating Kubernetes auth
  • 5.3 The Vault Agent Injector
  • 5.3.1 Configurations to support Kubernetes Vault Agent injection
  • Summary
  • 6 Accessing cloud secrets stores
  • 6.1 The Container Storage Interface and Secrets Store CSI Driver
  • 6.1.1 Container Storage Interface
  • 6.1.2 Container Storage Interface and Kubernetes
  • 6.1.3 CSI and secrets
  • 6.1.4 Installing prerequisites
  • 6.1.5 Installing the Secrets Store CSI Driver
  • 6.1.6 Consuming HashiCorp Vault secrets via the Secrets Store CSI Driver and the HashiCorp Vault provider