From the course: Certified Kubernetes Security Specialist (CKS) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Understanding external access to Kubernetes

Understanding external access to Kubernetes

- External access to Kubernetes has to do with the fact that your application and your cluster is serving applications that need to be reachable. And that's a fundamental aspect of how we leverage Kubernetes for our workloads. But what needs to be protected is the various ways in which you can gain access to different services and different components. Now, we've talked before about some of those capabilities, but in this lesson, we're going to dive a little bit deeper into how you can protect that, how you can identify different ports that are open and various things. Now, the underlying Kubernetes operating system is ultimately an endpoint as well. It's not just your applications that are the areas of concern. And you can use firewalls in your infrastructure to be able to limit access, to be able to control what services and capabilities are available from the internet, for example, or even internal systems. But you also have the ability to be able to leverage the host-based…

Contents