Securing Kubernetes Secrets is a compact hands-on guide to storing and protecting sensitive data in a Kubernetes environment. YouGÇÖll learn a security-first mindset that is vital for storing and using secrets correctly, and tools and concepts that will help you manage sensitive assets such as certificates, keys, and key rotation. Throughout, youGÇÖll tinker with relevant real-world examples. Protect secrets stored in a source code repository and consume them in a Kubernetes cluster, deploy HashiCorp Vault to secure KubernetesGÇÖs underlying infrastructure components and applications running…mehr
Securing Kubernetes Secrets is a compact hands-on guide to storing and protecting sensitive data in a Kubernetes environment. YouGÇÖll learn a security-first mindset that is vital for storing and using secrets correctly, and tools and concepts that will help you manage sensitive assets such as certificates, keys, and key rotation. Throughout, youGÇÖll tinker with relevant real-world examples. Protect secrets stored in a source code repository and consume them in a Kubernetes cluster, deploy HashiCorp Vault to secure KubernetesGÇÖs underlying infrastructure components and applications running on the platform, along with adding layers of security to maintain protection even in the event of a partial breach. By the time youGÇÖre finished, youGÇÖll have a toolbox of techniques that you can apply both as a developer or operations professional.
Alex Soto is a director of developer experience at Red Hat, a Java Champion since 2007, an international speaker, and a teacher at Salle URL University. Andrew Block is a distinguished architect with Red Hat who works with organizations to design and implement solutions leveraging cloud native technologies. He is active in the open-source community as both a presenter and contributor.
Inhaltsangabe
table of contents PART 1: FOUNDATIONS READ IN LIVEBOOK1KUBERNETES SECRETS READ IN LIVEBOOK2REINTRODUCING KUBERNETES & SECRETS PART 2: SECURING SECRETS READ IN LIVEBOOK3SECURELY STORING SECRETS READ IN LIVEBOOK4ENCRYPTION DATA AT REST READ IN LIVEBOOK5HASHICORP VAULT & KUBERNETES, READ IN LIVEBOOK6ACCESSING CLOUD SECRET STORES PART 3: RELEASING APPLICATIONS SECURELY READ IN LIVEBOOK7KUBERNETES-NATIVE CONTINUOUS INTEGRATION & SECRETS READ IN LIVEBOOK8KUBERNETES-NATIVE CONTINUOUS DELIVERY & SECRETS APPENDIXES READ IN LIVEBOOKAPPENDIX A: KUBERNETES SECRETS READ IN LIVEBOOKAPPENDIX B: INSTALLING AND CONFIGURING YQ READ IN LIVEBOOKAPPENDIX C: INSTALLING AND CONFIGURING PIP READ IN LIVEBOOKAPPENDIX D: INSTALLING AND CONFIGURING GIT READ IN LIVEBOOKAPPENDIX E: INSTALLING GPG
table of contents PART 1: FOUNDATIONS READ IN LIVEBOOK1KUBERNETES SECRETS READ IN LIVEBOOK2REINTRODUCING KUBERNETES & SECRETS PART 2: SECURING SECRETS READ IN LIVEBOOK3SECURELY STORING SECRETS READ IN LIVEBOOK4ENCRYPTION DATA AT REST READ IN LIVEBOOK5HASHICORP VAULT & KUBERNETES, READ IN LIVEBOOK6ACCESSING CLOUD SECRET STORES PART 3: RELEASING APPLICATIONS SECURELY READ IN LIVEBOOK7KUBERNETES-NATIVE CONTINUOUS INTEGRATION & SECRETS READ IN LIVEBOOK8KUBERNETES-NATIVE CONTINUOUS DELIVERY & SECRETS APPENDIXES READ IN LIVEBOOKAPPENDIX A: KUBERNETES SECRETS READ IN LIVEBOOKAPPENDIX B: INSTALLING AND CONFIGURING YQ READ IN LIVEBOOKAPPENDIX C: INSTALLING AND CONFIGURING PIP READ IN LIVEBOOKAPPENDIX D: INSTALLING AND CONFIGURING GIT READ IN LIVEBOOKAPPENDIX E: INSTALLING GPG
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309