This resource is no longer available

Kubernetes Open-Source Orchestration & Security

Cover

Organizations often rely on an open-source container orchestration for security functions such as authentication, authorization, logging and resource isolation, as well as workload and network segmentation.

For many, this means using Kubernetes container runtime environment. However, within this environement there are typically 4 types of threats, including:

  • External attacks aiming to compromise controls
  • Compromised containers or nodes
  • Compromised credentials
  • Misuse of legitimate privileges

This resource discusses these threat models and various security considerations for a secure Kubernetes deployment as well as best practices for acquiring optimal results.

Vendor:
Aqua Security
Posted:
22 Aug 2018
Published:
22 Aug 2018
Format:
PDF
Length:
27 Page(s)
Type:
Resource
Language:
English

This resource is no longer available.