From the course: Learning Kubernetes

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Kubernetes security

Kubernetes security - Kubernetes Tutorial

From the course: Learning Kubernetes

Start my 1-month free trial

Kubernetes security

- [Narrator] Like any set of servers on the internet, Kubernetes is susceptible to attacks by malicious actors. The kinds of threats against Kubernetes clusters are always changing, but there's a standard set of security best practices you can apply to your clusters, and in this video, I'll show you a few you can apply right away. In targeting Kubernetes clusters, hackers are often hoping to achieve one of three things: To steal data from inside the cluster, to harness the computational power of the cluster to set up a cryptocurrency mining operation, or to cause a distributed denial of service or DDoS attack. The first thing you can do to secure your Kubernetes cluster is to add some security context info to your pods. If someone accesses your cluster and can remotely control a container like we learned how to do in the video about Busy Box, they can create a security nightmare by installing new software and using the program…

Contents