Section 1: Introduction to Kubernetes

In this section, you will grasp the fundamental concepts of Kubernetes' architecture, network models, threat models, and the core security principles that should be applied to a Kubernetes cluster.

The following chapters are included in this section:

  • Chapter 1, Kubernetes Architecture
  • Chapter 2, Kubernetes Networking
  • Chapter 3, Threat Modeling
  • Chapter 4, Applying the Principle of Least Privilege in Kubernetes
  • Chapter 5, Configuring Kubernetes Security Boundaries