Kubernetes Security Best Practices You Need to Know | THE Guide to Securing Your K8s Cluster!

Kubernetes Security Best Practices You Need to Know | THE Guide to Securing Your K8s Cluster!

HomeTechWorld with NanaKubernetes Security Best Practices You Need to Know | THE Guide to Securing Your K8s Cluster!
Kubernetes security best practices you need to know | THE Guide to Securing Your K8s Cluster!
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
Secure your K8s cluster with these Top 10 Kubernetes Security Best Practices | Kubernetes security 101
Become a Kubernetes administrator ► https://bit.ly/420TrA7
Become a DevOps Engineer – complete educational program ► https://bit.ly/3q7Ir6X
Follow me on IG for behind the scenes content ► https://bit.ly/2F3LXYJ

Learn more about Kubernetes Backup and Restore with Kasten: https://youtu.be/01qcYSck1c4

#kubernetes #devops #techworldwithnana

► Thank you Kasten for sponsoring this video
► Free Kubernetes Backup & Migration – Download Free Kasten K10 #1 Kubernetes Backup: https://www.kasten.io/nana

In this video I talk about a super important topic, security in Kubernetes, and what some of the best practices are for securing your Kubernetes cluster.

The big challenge we see in terms of Kubernetes security is that it is already so challenging to set up and configure a Kubernetes cluster to deploy the applications within it, that security often becomes an afterthought on top of the already complex configuration . However, we cannot deny the importance of security, especially when the systems are so complex!

Cloud applications are actually becoming a very attractive target for many hackers and this growing number of cloud-native applications tend to use Kubernetes as a platform and that is where the relevance of knowing how to secure Kubernetes clusters comes into play.

▬▬▬▬▬▬ LINKS ▬▬▬▬▬▬
Sign up to stay informed about new upcoming courses ► https://www.techworld-with-nana.com/course-roadmap

▬▬▬▬▬▬ TIME STAMPS ▬▬▬▬▬▬
0:00 – Introduction
00:33 – Cloud security in general
01:39 – Security in Kubernetes
02:26 – Security as spectrum
04:39 – BP 1 – Scan image
09:45 – BP 2 – Running as non-root user
11:08 – BP 3 – Users and permissions with RBAC
15:44 – BP 4 – Use network policies
18:18 – BP 5 – Coding communication
19:06 – BP 6 – Secure classified data
20:34 – BP 7 – Safe etc
22:05 – BP 8 – Automated backup and restore
24:54 – BP 9 – Configure security policies
26:50 – BP 10 – Emergency recovery

▬▬▬▬▬▬ Would you like to know more? ▬▬▬▬▬▬
Complete Python Course ► https://youtu.be/t8pPdKYpowI
Complete Docker course ► https://youtu.be/3c-iBn73dDE
Complete K8s course ► https://youtu.be/X48VuDVv0do
DevOps Tools Explained ► https://bit.ly/2W9UEq6

▬▬▬▬▬▬ Contact me ▬▬▬▬▬▬
INSTAGRAM ► https://bit.ly/2F3LXYJ
TWITTER ► https://bit.ly/3i54PUB
LINKEDIN ► https://bit.ly/3hWOLVT
FB group ► https://bit.ly/32UVSZP
DEV ► https://bit.ly/3h2fqiO

▬▬▬▬▬▬ Courses & Bootcamp & E-books ▬▬▬▬▬▬
► Become a DevOps Engineer – complete educational program https://bit.ly/45mXaer
► High-quality and practice-oriented courses https://bit.ly/3BNS8Kv
► Kubernetes 101 – compact and easy-to-read ebook bundle https://bit.ly/3Ozl28x

Please take the opportunity to connect and share this video with your friends and family if you find it helpful.