
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Cloud Native Security
About this book
Explore the latest and most comprehensive guide to securing your Cloud Native technology stack
Cloud Native Security delivers a detailed study into minimizing the attack surfaces found on today's Cloud Native infrastructure. Throughout the work hands-on examples walk through mitigating threats and the areas of concern that need to be addressed. The book contains the information that professionals need in order to build a diverse mix of the niche knowledge required to harden Cloud Native estates.
The book begins with more accessible content about understanding Linux containers and container runtime protection before moving on to more advanced subject matter like advanced attacks on Kubernetes. You'll also learn about:
- Installing and configuring multiple types of DevSecOps tooling in CI/CD pipelines
- Building a forensic logging system that can provide exceptional levels of detail, suited to busy containerized estates
- Securing the most popular container orchestrator, Kubernetes
- Hardening cloud platforms and automating security enforcement in the cloud using sophisticated policies
Perfect for DevOps engineers, platform engineers, security professionals and students, Cloud Native Security will earn a place in the libraries of all professionals who wish to improve their understanding of modern security challenges.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Part I
Container and Orchestrator Security
www.cncf.io), reported in its 2020 survey that “the use of containers in production has increased to 92%, up from 84% last year, and up 300% from our first survey in 2016” and also that “Kubernetes use in production has increased to 83%, up from 78% last year.” The report (www.cncf.io/wp-content/uploads/2020/12/CNCF_Survey_Report_2020.pdf) takes note of a number of useful facts that demonstrate that the way modern applications are developed and hosted is continuing to evolve using Cloud Native technologies and methodologies. A significant component, as the survey demonstrates, involves containerization, and for that reason the first six chapters of this book explore the security of containers and container orchestrators. The final part of the book examines this topic using more advanced examples and scenarios.In This Part
- Chapter 1: What Is A Container?
- Chapter 2: Rootless Runtimes
- Chapter 3: Container Runtime Protection
- Chapter 4: Forensic Logging
- Chapter 5: Kubernetes Vulnerabilities
- Chapter 6: Container Image CVEs
CHAPTER 1
What Is A Container?
Common Misconceptions
www.linux-kvm.org), for example. Virtual machines using such technologies can run on the same physical machine and do indeed share significant levels of segregation, improving their security posture significantly. Helpful information is provided in a white paper by a long-standing commercial brand, VMware, that offers a detailed look at how this works.www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/whitepaper/techpaper/vmw-white-paper-secrty-vsphr-hyprvsr-uslet-101.pdfxenproject.org), where guest operating systems (OSs) can share hardware on a modified host OS.NOTE
Table of contents
- Cover
- Table of Contents
- Title Page
- Introduction
- Part I: Container and Orchestrator Security
- Part II: DevSecOps Tooling
- Part III: Cloud Security
- Part IV: Advanced Kubernetes and Runtime Security
- Index
- Copyright
- About the Authors
- About the Technical Editor
- End User License Agreement