Kubernetes Security Best Practices you need to know | THE Guide for securing your K8s cluster!

  Рет қаралды 204,346

TechWorld with Nana

TechWorld with Nana

Күн бұрын

Пікірлер: 142
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
Please share with others, which K8s security best practice is important, which I didn't mention? 💙 Become a Kubernetes Administrator ► bit.ly/420TrA7 💚 Become a DevOps Engineer - full educational program ► bit.ly/3q7Ir6X 💛 Follow me on IG for behind-the-scenes-content ► bit.ly/2F3LXYJ 💡 Sign up to get notified about new upcoming courses ► www.techworld-with-nana.com/course-roadmap
@ayushsitoke2456
@ayushsitoke2456 2 жыл бұрын
Awesome! 1. Do Image Scanning for vulnerability 2. Avoid root user for running container 3. Manage User & Permission - RBAC 4. Use Network policies or service mesh 5. Encrypt Communication 6. Secure secret data 7. Secure etcd 8. Backup & Restore 9. Configure security policies 10. Disaster Recovery
@aliandy.jf.nababan
@aliandy.jf.nababan Жыл бұрын
You're right, Nana is very good presenting concept basis for developer knowledge, especially when presenting strength weakness opportunity threat (SWOT) analisis kind of comparison of different DevOps tools👍
@dattavr
@dattavr Жыл бұрын
So basically, protection at 3 layers, 1. Network 2. Application 3. Data All above 10 points are in these category
@BDubzDM21
@BDubzDM21 2 жыл бұрын
I learned more from this 30 Minute video than I did the entire Linux Foundation Kubernetes Security Essentials course. Thanks!
@kamleshmak23
@kamleshmak23 2 жыл бұрын
Thanks for always an easy to follow content and giving me more knowledge
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
Thank you, really appreciate your support!
@bengalivoyages
@bengalivoyages 2 жыл бұрын
The more I watch your youtube videos, more it clarify basics of each K8s components!!! you are the best...!
@dsha256
@dsha256 2 жыл бұрын
Nana, your explanation skills are just great, as usual! 🙏❤️
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
Thanks so much David! 💙
@kameh4522
@kameh4522 2 жыл бұрын
These security best practices are at root based on several infosec standards such as iso27001, and you have applied these for K8s beautifully.
@adityashashankaneti940
@adityashashankaneti940 2 жыл бұрын
The word "best teacher" is too not enough to describe you. Thank you 🙏🙏🙏
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
Thanks so much 💙
@jennyfreckleface
@jennyfreckleface Жыл бұрын
Best cloud and K8S security content. Bravo. Thank you for sharing.
@kiannec2890
@kiannec2890 2 жыл бұрын
Very helpful and made my day since I’ve been figuring out how to do this and I learned it so quick as I clicked into this video,thanks girl
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
Glad it was helpful Kianne! :)
@rajrathor6505
@rajrathor6505 2 жыл бұрын
Nana, I love the way you explain each and every point. You are the best Teacher in the world. Thanks and appreciate all your hard work.
@sagarahire6531
@sagarahire6531 2 жыл бұрын
Much needed video...was wondering about the security of kubernetes...You're being a Santa just keep fulfilling the wishes...Thanks for your time and effort
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
My pleasure! I'm glad it was helpful 😊💙
@lovehumanrace
@lovehumanrace 11 ай бұрын
Fantastic overview! Just what I was looking for. Thank you. 🙏
@narasimhachinimilly
@narasimhachinimilly 2 жыл бұрын
Really awesome, appreciate how you organized the content. Happy to learn good things.😀
@DejiAdegbite
@DejiAdegbite Ай бұрын
This is the best video on this topic that I've ever seen.
@vikrama736
@vikrama736 2 жыл бұрын
This is such a great stuff and important too! Thanks Nana! The best tutor!
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
Happy to hear, thank you Vikram :)
@picapicatchof8309
@picapicatchof8309 11 ай бұрын
Hi, first of all I would like to thank you for your great effort to explain us the k8s cybersecurity issues and how to mitigate threats related to its deployment, just one the most important thing that also can improve the K8s security is the log management, it give you the possibility to control and monitor security issues in real time using for example syslog protocol to collect and treat them in a centralized areas. So, if you can focus on this issue in next time. Thanks.
@c1i2s3c4o5
@c1i2s3c4o5 2 жыл бұрын
Great video Mam !!!, a very core feature which is rarely being used in companies for implementing k8s security, kindly also cover Locking Down Kubelet as its a backdoor for api server & image signature as its must to make sure that image is a legitimate one, Thank You
@princeugly3457
@princeugly3457 2 жыл бұрын
Thank you Nana, your content always great and easy to understand.
@tbugaevsky
@tbugaevsky 2 жыл бұрын
Security is a very important thing to take care of, thank you.
@remyzandwijk
@remyzandwijk 2 жыл бұрын
Excellent and very helpful video. Thanks Nana!
@vijaykumar-x3z7w
@vijaykumar-x3z7w 2 ай бұрын
great and very helpful content Nana, thank you so much for your efforts
@jamalakhaligova9125
@jamalakhaligova9125 Ай бұрын
Amazing! Very useful, thanks for the great content :)
@walterpalladino1965
@walterpalladino1965 2 жыл бұрын
First of all this was a great video on this series. I have a question related to the point 10. You marked this as result of a successful attack but, if you just restore the cluster, could get attacked the same way so, there are any tool that lets you identify how it happened to solve the related security flaws? Thank you in advance.
@NeerajKVlogs007
@NeerajKVlogs007 2 жыл бұрын
Well explained Nana... thanks for making such a amazing content 👍
@YawadoudouAllahou
@YawadoudouAllahou Жыл бұрын
Nama you are pedagogical breaking down this security .Thanks
@review.masahiro
@review.masahiro Жыл бұрын
love your content and clear explanation. it is 10/10 from me. thank you nana
@user-ano-x5c
@user-ano-x5c Жыл бұрын
Nice Explanation.. Also one of the best practices to secure Etcd is to encrypt it..
@pareshpatel493
@pareshpatel493 2 жыл бұрын
As usual, PERFECT. God Bless you.
@arvindkumarreddydubbala5775
@arvindkumarreddydubbala5775 2 жыл бұрын
you explanation is really understandable by every one. Simply superb work keep it up.
@md.ishtayaqueahmad3170
@md.ishtayaqueahmad3170 Жыл бұрын
Very well explained. Thank you very much for sharing such informative video.
@testquality1900
@testquality1900 2 жыл бұрын
Great explanation! Direct and clear to the topic 💯
@9sandy13
@9sandy13 2 жыл бұрын
Great fan of your work and your tech videos, your explanation is really very helpful to understand the concepts, keep up the good work.
@rakeshnalagandla7746
@rakeshnalagandla7746 Жыл бұрын
Great video. Thank you so much. Can you suggest a enterprise grade tool that helps with most of these best practices rather than using different tools for each type
@cybersecurity-with-petty-bug
@cybersecurity-with-petty-bug Жыл бұрын
Thanks you. Is was very helpful for understanding the k8s security concept.
@ireenisabel988
@ireenisabel988 2 жыл бұрын
Hi thanks for these videos. I have a request. If you find some time can you please make a video on how you learn a technology/concpet this thorough? For me, it takes couple of times reading and trying out before I understand the basics properly. If you have a shortcut, we would love to know.
@GaneshMerugu-f9f
@GaneshMerugu-f9f 3 ай бұрын
Very nice explanation... Excellent.
@maheshirk
@maheshirk 2 жыл бұрын
Truly awesome, Thank You Nana !
@kameh4522
@kameh4522 2 жыл бұрын
What a fabulous explanation, thank you kindly.
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
Happy to hear! Appreciate your positive feedback! 💙
@kchaitanya39
@kchaitanya39 Жыл бұрын
Thank you Nana for the awesome explanation
@thomash.8297
@thomash.8297 2 жыл бұрын
Thank you, waited for that 😮
@georgelobo4048
@georgelobo4048 2 жыл бұрын
Best explanation! Thanks, Nana!!
@CloudSecurityGuy
@CloudSecurityGuy 2 жыл бұрын
Awesome video !
@felipeozoski
@felipeozoski 2 жыл бұрын
Great stuff as usual!!
@stevenromero9962
@stevenromero9962 2 жыл бұрын
Great explanation, this is top level content.
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
Thanks Steven :)
@LichaYb
@LichaYb 2 жыл бұрын
Great video! Greetings from Argentina!
@sujeetkumar.
@sujeetkumar. 2 жыл бұрын
Wonderful video 😍
@DrorNir
@DrorNir 2 жыл бұрын
I've just started a job as DevSecOps and I have zero experience. I'm buying the course as it comes out!
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
Good to hear! I'm sure it can be pretty challenging.
@LuHaTube
@LuHaTube 2 жыл бұрын
Thanks very much Nana for your great effort.
@ishaquerazvi2670
@ishaquerazvi2670 2 жыл бұрын
I really like the way you teach, I prefer your videos over udemy .....thanks a lot
@manasanayini2655
@manasanayini2655 11 ай бұрын
Big thanks for the best lecture!!
@nupeamanga9514
@nupeamanga9514 Жыл бұрын
Thanks a lot for this priceless narratives
@ChanceTEK
@ChanceTEK 2 жыл бұрын
Extremely helpful. Thank you.
@omdxp
@omdxp 2 жыл бұрын
Thank you so much for these valuable information
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
My pleasure! Appreciate your comment!
@deepanchakrvarthyp7063
@deepanchakrvarthyp7063 2 жыл бұрын
Very clear explanation,thanks you so much
@kingsadmin
@kingsadmin Жыл бұрын
nice one! thank you Nana!
@TamLe-sh2ru
@TamLe-sh2ru 2 жыл бұрын
Thanks, great video!
@TheEbbemonster
@TheEbbemonster 2 жыл бұрын
Great video! It would be nice if you inform the viewer whenever, you jump to a sponsored or affiliated component, such that the viewed knows that your view on that component is biased like with Kasten K10.
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
Thanks for your valuable feedback! Sure, will try to make it clearer in the videos, when talking about the sponsored tool.
@derekreed6798
@derekreed6798 2 жыл бұрын
Many thanks, plenty of food for thought.
@NicolasGryman
@NicolasGryman 2 жыл бұрын
Thanks Nana, you rock!
@kreativcity
@kreativcity 2 жыл бұрын
Thank you Nana!
@darshanmehta9374
@darshanmehta9374 2 жыл бұрын
You have been great Nana - really appreciate you giving the right amount of details. I wanted to ask while I understand 3rd party product was mentioned for data recovery, I wanteed to ask if Volume Storage can help in protecting or recovering the application/config data in any which ways during a cyber event. If anyone can hep - wouldd be appreciated.
@jamallmahmoudi9481
@jamallmahmoudi9481 Жыл бұрын
Hi, It was great and useful, thank you🙏
@Fayaz-Rehman
@Fayaz-Rehman 2 жыл бұрын
Great - Thanks for sharing.
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
My pleasure! :)
@rajeshdhapola07
@rajeshdhapola07 2 жыл бұрын
Great explanation...Thanks
@mousumisaha4525
@mousumisaha4525 2 жыл бұрын
Thank you for this awasome video
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
My pleasure! 💙
@simon-rey
@simon-rey 2 жыл бұрын
Great video, very informative and smart ideas, thanks
@loading418
@loading418 2 жыл бұрын
knowledge ++ many many ty
@sahanasadasivam7056
@sahanasadasivam7056 2 жыл бұрын
Hi Nana,discuss about what are the career paths in software field,it will be helpful,to set goal beside that
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
Will consider. Thanks for suggestion!
@parris3142
@parris3142 2 жыл бұрын
Great overview.. thanks
@LaVidaEnUnaGota
@LaVidaEnUnaGota 2 жыл бұрын
for scan image, you could use anchore
@MuhammedDahab
@MuhammedDahab 2 жыл бұрын
Great Stuff as usually
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
Glad you enjoy it! Thanks 😊
@alexserbul
@alexserbul Жыл бұрын
Thank you!
@s.sandeep
@s.sandeep 2 жыл бұрын
Thanks!
@yinyang2k
@yinyang2k 2 жыл бұрын
Thank you for the video! 🙏 I’m interested in using Hashicorp Vault. Could you maybe make a video about it to? :)
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
Thank you for your suggestion. Yes, we are thinking about making video about Vault.
@joyebot7371
@joyebot7371 Жыл бұрын
Thank you
@MirajGodha
@MirajGodha 2 жыл бұрын
Awesome bro
@maneeshs3876
@maneeshs3876 2 жыл бұрын
Nice informative video !
@blakegreendev
@blakegreendev 2 жыл бұрын
Just to help drive home the misconception of the security in cloud in general. Each cloud provider has a shared responsibility model. The cloud provider is responsible for the security OF the cloud and the customer is responsible for the security IN the cloud :)
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
Thanks for sharing :)
@rampanwar1316
@rampanwar1316 2 жыл бұрын
Bery good Video nana
@shalandichannel
@shalandichannel 2 жыл бұрын
thanks for the nice video! i habe got 2 doubts after watching the video: 1. in point 5 you mention that pods traffic is unencrypted by default. is this only true for communication inside the cluster, i.e. is the host to host communication for both control plane and pods elements encrypted from the outside? if this is not the case, is it necessary to setup a VPN mesh between the k8s nodes or would that be an unusual overhead in regular k8s deployments? 2. how about securing network access to cluster and its services on a TCP level? can port 6443 remain unprotected? should administrator always access the cluster protected services via port forwarding or is it best to publish ingresses on a protected subnet and then setup a VPN to push that subnet to authorized users? what are best/common cloud native practices here? is there any helm chart for that? thanks
@varun-i2r5b
@varun-i2r5b 3 ай бұрын
can you do video on network plugins like calico and cilium
@omarakki705
@omarakki705 2 жыл бұрын
Thanks nana
@satyamgpt31
@satyamgpt31 2 жыл бұрын
Really helpful
@Harridu
@Harridu 2 жыл бұрын
Excellent
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
Thank you!!
@k.alipardhan6957
@k.alipardhan6957 10 ай бұрын
would have been helpful to mention more details on scanning... static, dymanic, SCA, and Docker Scout.
@eclipsetutorialvideo
@eclipsetutorialvideo 13 күн бұрын
Error at 00:10:38 AllowPrivilegeEscalation is not available on the pod level, only on the container level
@Harridu
@Harridu 2 жыл бұрын
One important point missing was a firewall between your cluster and the outside world.
@tomasferrari92
@tomasferrari92 2 жыл бұрын
i love u nana
@Tirax13
@Tirax13 2 жыл бұрын
hey nana, i like your content, do you have an advice for including security testing in the pipeline, like vulnerability scanning and compliance checks? For example how do i include cis benchmarks and vuln scanning and define thresholds that prevent unsecure workloads from going to production?
@sgrhr024
@sgrhr024 2 жыл бұрын
Nice question
@stockmarket9449
@stockmarket9449 Жыл бұрын
Image scanning happens in CI/CD and also Image registery regularly, we can consider to do such scanning at appropriate stage in deployment. Also we can consider to attach digital signature when run scanning is completed just before to start tranfer the image upon pull Image request from registery , and verify it at appropriate stage during deployment workflow. Please share your thoughts. Thank you!
@salilmandal872
@salilmandal872 6 ай бұрын
Nice
@cracksaadee
@cracksaadee 2 жыл бұрын
How to use regex in audit policy in k8s ?
@nr9885
@nr9885 2 жыл бұрын
Just pointing out that at 19:30 you forgot a "=" at the end of your mongo-password secret. In fact, it should be "bW9uZ29wYXNzd29yZA==". Maybe I do have too much free time 😅?
@TechWorldwithNana
@TechWorldwithNana 2 жыл бұрын
😀 great attention to detail! 👍
@MrDuoScythe
@MrDuoScythe 2 жыл бұрын
Get NeuVector...done :)
@JamesMcCabe703
@JamesMcCabe703 Жыл бұрын
Encryption: AWS engineers when using their KMS have a copy of the private key. So they become the insider threat. See arrest of Paige Thompson, AWS engineer who release Captial One customer data. Use you're own key management system.
@PrasannaVarshan
@PrasannaVarshan 2 жыл бұрын
Does any one else feels like crying? I found peace finally!!!!
@murali7403
@murali7403 2 жыл бұрын
Hi nana was attended 3 times interview within a span of 1 month in tcs but 3rd time i got selected and they released offer and joining date too while doing background check previous two attempts they will consider? Normally they will. Check the candidate before attending interview right wether candidate is attended or not like?
@vanzoelmaulana4324
@vanzoelmaulana4324 Жыл бұрын
actually sa can be used for human also
@R-Kannada-DevOps
@R-Kannada-DevOps Жыл бұрын
How to delete already pulled images from cluster to release space .
@Thomas-1023
@Thomas-1023 11 ай бұрын
I'm enchanted by this content. I had the pleasure of reading something similar, and I was completely enchanted. "Mastering AWS: A Software Engineers Guide" by Nathan Vale
RBAC in Kubernetes
20:27
Pavan Elthepu
Рет қаралды 41 М.
Почему Катар богатый? #shorts
0:45
Послезавтра
Рет қаралды 2 МЛН
Непосредственно Каха: сумка
0:53
К-Media
Рет қаралды 12 МЛН
Как Ходили родители в ШКОЛУ!
0:49
Family Box
Рет қаралды 2,3 МЛН
Kubernetes Security Best Practices 2021 (From Container Specialist)
17:01
10 DevOps Tools you need to know - The Complete Guide
11:27
TechWorld with Nana
Рет қаралды 171 М.
Kubernetes Crash Course for Absolute Beginners [NEW]
1:12:04
TechWorld with Nana
Рет қаралды 3 МЛН
Proxy vs Reverse Proxy vs Load Balancer | Simply Explained
13:19
TechWorld with Nana
Рет қаралды 289 М.
Kubernetes RBAC Explained
23:17
Anton Putra
Рет қаралды 17 М.
What is Platform Engineering and how it fits into DevOps and Cloud world
42:41
TechWorld with Nana
Рет қаралды 169 М.
Microservices explained - the What, Why and How?
18:30
TechWorld with Nana
Рет қаралды 915 М.