From the Node Up: The Complete Guide to Kubernetes Security

Most discussions of Kubernetes® security focus on how challenging it is to secure a cluster. Kubernetes offers only a handful of native security features, we’re told, which makes it exceedingly difficult to secure every layer of a Kubernetes environment.

This e-book explains how to design a security strategy that reinforces, rather than hinders, the rest of your Kubernetes-based processes. It identifies Kubernetes security challenges from the node up and pinpoints specific solutions for addressing each of them, with a focus on automated, scalable approaches that will keep Kubernetes-based workloads secure, no matter how large your cluster is or which type of infrastructure you use to host it—on-premises, public cloud, or managed service.

Palo Alto

Share content on email