DOWNLOAD Hacking Kubernetes: ThreatDriven Analysis and Defense Free Download

Hacking Kubernetes: Threat-Driven Analysis and Defense
Running cloud native workloads on Kubernetes can be challenging--keeping them secure is even more so.
Kubernetes's complexity offers malicious in-house users and external attackers alike a large assortment of attack vectors.
Hacking Kubernetes reviews defaults and threat models and shows how to protect against attacks.Securing your workloads is both essential and urgent, so this invaluable hands-on guide is available to you in an early release edition before it's available to the general public. It covers topics critical for cloud native security, detailing how to:Run Kubernetes securely, on both a strategic and an operational levelExploit Kubernetes default configurations and defend against these kinds of

attacksReview Kubernetes clusters for security weaknessesSecurely run arbitrary and untrusted codeHarden the Kubernetes setup to defend against any and all possible threats