DOWNLOAD Hacking Kubernetes: Threat-Driven Analysis and Defense Free Download Hacking Kubernetes: Th

Page 1

DOWNLOAD Hacking Kubernetes: ThreatDriven Analysis and Defense Free Download

Hacking Kubernetes: Threat-Driven Analysis and Defense

Running cloud native workloads on Kubernetes can be challenging--keeping them secure is even more so.

Kubernetes's complexity offers malicious in-house users and external attackers alike a large assortment of attack vectors.

Hacking Kubernetes reviews defaults and threat models and shows how to protect against attacks.Securing your workloads is both essential and urgent, so this invaluable hands-on guide is available to you in an early release edition before it's available to the general public. It covers topics critical for cloud native security, detailing how to:Run Kubernetes securely, on both a strategic and an operational levelExploit Kubernetes default configurations and defend against these kinds of

attacksReview Kubernetes clusters for security weaknessesSecurely run arbitrary and untrusted codeHarden the Kubernetes setup to defend against any and all possible threats

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.