Skip to Main Content
Hacking Kubernetes
book

Hacking Kubernetes

by Andrew Martin, Michael Hausenblas
October 2021
Intermediate to advanced content levelIntermediate to advanced
311 pages
7h 52m
English
O'Reilly Media, Inc.
Book available

Overview

Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share best-practice configuration to help you harden clusters from possible angles of attack.

This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system.

  • Understand where your Kubernetes system is vulnerable with threat modelling techniques
  • Focus on pods, from configurations to attacks and defenses
  • Secure your cluster and workload traffic
  • Define and enforce policy with RBAC, OPA, and Kyverno
  • Dive deep into sandboxing and isolation techniques
  • Learn how to detect and mitigate supply chain attacks
  • Explore filesystems, volumes, and sensitive information at rest
  • Discover what can go wrong when running multitenant workloads in a cluster
  • Learn what you can do if someone breaks in despite you having controls in place
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Learn Kubernetes Security

Learn Kubernetes Security

Kaizhe Huang, Pranjal Jumde
Networking and Kubernetes

Networking and Kubernetes

James Strong, Vallery Lancey
Cybersecurity Ops with bash

Cybersecurity Ops with bash

Paul Troncone, Carl Albing
Kubernetes Security and Observability

Kubernetes Security and Observability

Brendan Creane, Amit Gupta

Publisher Resources

Supplemental ContentErrata Page