{"product_id":"hacking-kubernetes-threat-driven-analysis-and-defense-paperback","title":"Hacking Kubernetes: Threat-Driven Analysis and Defense - Paperback","description":"\u003cdiv\u003e\u003cp style=\"text-align: right;\"\u003e\u003ca href=\"https:\/\/reportcopyrightinfringement.com\/\" target=\"_blank\" rel=\"nofollow\"\u003e\u003cb\u003eReport copyright infringement\u003c\/b\u003e\u003c\/a\u003e\u003c\/p\u003e\u003c\/div\u003e\u003cp\u003eby \u003cb\u003eAndrew Martin\u003c\/b\u003e (Author), \u003cb\u003eMichael Hausenblas\u003c\/b\u003e (Author)\u003c\/p\u003e\u003cp\u003e\u003c\/p\u003e\u003cp\u003eWant to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share best-practice configuration to help you harden clusters from possible angles of attack. \u003c\/p\u003e\u003cp\u003e This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system. \u003c\/p\u003e\u003cul\u003e \u003cli\u003eUnderstand where your Kubernetes system is vulnerable with threat modelling techniques \u003c\/li\u003e\n\u003cli\u003eFocus on pods, from configurations to attacks and defenses \u003c\/li\u003e\n\u003cli\u003eSecure your cluster and workload traffic \u003c\/li\u003e\n\u003cli\u003eDefine and enforce policy with RBAC, OPA, and Kyverno \u003c\/li\u003e\n\u003cli\u003eDive deep into sandboxing and isolation techniques \u003c\/li\u003e\n\u003cli\u003eLearn how to detect and mitigate supply chain attacks \u003c\/li\u003e\n\u003cli\u003eExplore filesystems, volumes, and sensitive information at rest \u003c\/li\u003e\n\u003cli\u003eDiscover what can go wrong when running multitenant workloads in a cluster \u003c\/li\u003e\n\u003cli\u003eLearn what you can do if someone breaks in despite you having controls in place \u003c\/li\u003e\n\u003c\/ul\u003e\u003ch3\u003eAuthor Biography\u003c\/h3\u003e\u003cp\u003e\u003c\/p\u003e\u003cp\u003eAndrew Martin is CEO of ControlPlane.\u003c\/p\u003e\u003cp\u003eMichael Hausenblas is Product Developer Advocate Amazon Web Service.\u003c\/p\u003e\n            \u003cdiv\u003e\n\u003cstrong\u003eNumber of Pages:\u003c\/strong\u003e 311\u003c\/div\u003e\n            \u003cdiv\u003e\n\u003cstrong\u003eDimensions:\u003c\/strong\u003e 0.66 x 9.19 x 7 IN\u003c\/div\u003e\n            \u003cdiv\u003e\n\u003cstrong\u003ePublication Date:\u003c\/strong\u003e November 16, 2021\u003c\/div\u003e\n            ","brand":"BooksCloud","offers":[{"title":"Default Title","offer_id":52493680542003,"sku":"9781492081739","price":72.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0300\/5595\/6612\/files\/NjhkRTFEV0ZkTjRqNnRqVHVGN1N3dz09.webp?v=1759960746","url":"https:\/\/www.vysn.com\/en-ca\/products\/hacking-kubernetes-threat-driven-analysis-and-defense-paperback","provider":"VYSN","version":"1.0","type":"link"}