From the course: Certified Kubernetes Security Specialist (CKS) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Module 5: Minimize microservice vulnerabilities introduction

Module 5: Minimize microservice vulnerabilities introduction - Kubernetes Tutorial

From the course: Certified Kubernetes Security Specialist (CKS) Cert Prep

Module 5: Minimize microservice vulnerabilities introduction

- Welcome to Module 5: Minimizing Microservices Vulnerabilities. This module is dedicated to enhancing the security of microservices in the Kubernetes environment. We'll explore various techniques including setting up pod security standards, managing Kubernetes Secrets, using container isolation techniques, and, of course, implementing pod-to-pod encryption using Cilium. Each lesson is going to teach you the knowledge and tools necessary to be able to protect these microservices from potential threats and vulnerabilities, as well as to be able to get in control over how your Kubernetes cluster is configured, so that you can minimize the risks associated with operating it in this environment.

Contents