Kubernetes Security Best Practices You Need to Know – THE Guide to Securing Your K8s Cluster!

Kubernetes Security Best Practices You Need to Know – THE Guide to Securing Your K8s Cluster!

HomeTechWorld with NanaKubernetes Security Best Practices You Need to Know – THE Guide to Securing Your K8s Cluster!
Kubernetes Security Best Practices You Need to Know – THE Guide to Securing Your K8s Cluster!
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
Secure your K8s cluster with these top 10 Kubernetes security best practices Kubernetes Security 101
Become a Kubernetes administrator https://bit.ly/420TrA7
Become a DevOps Engineer – complete training program https://bit.ly/3q7Ir6X
Follow me on IG for behind the scenes looks https://bit.ly/2F3LXYJ

Learn more about Kubernetes backup and restore with Kasten: https://youtu.be/01qcYSck1c4

#kubernetes #devops #techworldwithnana

Many thanks to Kasten for sponsoring this video
Free Kubernetes Backup and Migration – Download Kasten K10 #1 Kubernetes Backup for free: https://www.kasten.io/nana

In this video I talk about a very important topic, security in Kubernetes, and explain what are some of the best practices for securing your Kubernetes cluster.

The big challenge we see with Kubernetes security is that it is already so difficult to set up a Kubernetes cluster and configure it to deploy the applications within it that security often takes a back seat and is added to this already complex configuration. However, we cannot deny the importance of security, especially when the systems are so complex!

In fact, cloud applications are becoming a very attractive target for many hackers. And the growing number of native cloud applications predominantly use Kubernetes as a platform. And this is where knowing how to secure Kubernetes clusters becomes important.

LEFT
Sign up to be notified of new courses: https://www.techworld-with-nana.com/course-roadmap

TIME STAMP
0:00 – Introduction
00:33 – Security in the cloud in general
01:39 – Security in Kubernetes
02:26 – Security as a spectrum
04:39 – BP 1 – Image scanning
09:45 – BP 2 – Run as non-root user
11:08 – BP 3 – Users and permissions with RBAC
15:44 – BP 4 – Using network policies
18:18 – BP 5 – Encrypting communication
19:06 – BP 6 – Secure secret data
20:34 – BP 7 – Safe etcd
22:05 – BP 8 – Automated Backup and Restore
24:54 – BP 9 – Configure security policies
26:50 – BP 10 – Disaster Recovery

Would you like to know more?
Full Python Course https://youtu.be/t8pPdKYpowI
Full Docker Course https://youtu.be/3c-iBn73dDE
Full K8s Course https://youtu.be/X48VuDVv0do
DevOps tools explained https://bit.ly/2W9UEq6

Connect with me
INSTAGRAM https://bit.ly/2F3LXYJ
TWITTER https://bit.ly/3i54PUB
LINKEDIN https://bit.ly/3hWOLVT
FB group https://bit.ly/32UVSZP
DEVELOPER https://bit.ly/3h2fqiO

Courses & Bootcamp & Ebooks
Become a DevOps Engineer – complete educational program https://bit.ly/45mXaer
High-quality and practical courses https://bit.ly/3BNS8Kv
Kubernetes 101 – compact and easy-to-read e-book package https://bit.ly/3Ozl28x

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.