Learn best practices and security controls for containers and the Kubernetes ecosystem using a simple five-factor security model.
Containers have transformed the way applications are built, deployed, and managed. But itâs only a matter a time before a vulnerability or misconfiguration leads to a newsworthy security breach. Establishing security controls is essential to protect applications being deployed in orchestration systems like Kubernetes. This course explains how to secure containers and the Kubernetes ecosystem using a simple five-factor model. Instructor Sam Sehgalâa security strategist and architect âreviews the containers and Kubernetes technology architecture, the application development and deployment life cycle, as well as the attack surface and vectors. He then introduces his five-factor security model to protect Kubernetes and its components, and shows how to apply security controls to the design and code, images and registries, containers and hosts, applications, and Kubernetes clusters.