Kubernetes: Securing API Access From the Outside Via Role-Based Access and Strong Authentication



  • This is the first of a series of three articles focusing on Kubernetes security: the outside attack, the inside attack, and dealing with resource consumption or noisy neighbors. Kubernetes has become a popular cloud container orchestration system, providing a “platform for automating deployment, scaling and operations of application containers across clusters of hosts,” according to the Cloud Native Computing Foundation (CNCF). However, the general lack of awareness of security issues related to the Kubernetes environment can expose various components to attacks from both inside and outside the network clusters.

    https://rancher.com/blog/2019/kubernetes-security-outside-attacks/

Log in to reply
 

© Lightnetics 2024