[go: up one dir, main page]

Stencel et al., 2025 - Google Patents

Security in Kubernetes

Stencel et al., 2025

Document ID
6224719754611724374
Author
Stencel G
Berton L
Publication year
Publication venue
Kubernetes Recipes: A Practical Guide for Container Orchestration and Deployment

External Links

Snippet

This chapter provides a comprehensive guide to enhancing the security posture of Kubernetes environments. It covers a wide array of security practices designed to protect workloads, sensitive data, and network communications within the Kubernetes cluster. The …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements

Similar Documents

Publication Publication Date Title
Zaheer et al. eztrust: Network-independent zero-trust perimeterization for microservices
Scott-Hayward et al. A survey of security in software defined networks
CN113810369B (en) Device authentication based on tunnel client network request
US8452881B2 (en) System and method for bridging identities in a service oriented architecture
Banse et al. A secure northbound interface for SDN applications
EP2332285B1 (en) Methods and systems for securely managing virtualization platform
US20140298419A1 (en) System and method for bridging identities in a service oriented architectureprofiling
EP1641215B1 (en) System and method for bridging identities in a service oriented architecture
EP2792104A1 (en) Automated access, key, certificate, and credential management
Beer et al. Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Chandramouli et al. Attribute-based access control for microservices-based applications using a service mesh
US20240364689A1 (en) Accessing Cloud Environments Through Administrative Tenancies To Comply With Sovereignty Requirements
Liu et al. DACAS: integration of attribute-based access control for northbound interface security in SDN
Tseng et al. A comprehensive 3‐dimensional security analysis of a controller in software‐defined networking
Gudu et al. Enabling secure shell access with openid connect
WO2024227197A1 (en) Accessing cloud environments through administrative tenancies to comply with sovereignty requirements
RU2422886C2 (en) Providing coordinated passage of firewall having application information
Budigiri et al. Zero-cost in-depth enforcement of network policies for low-latency cloud-native systems
Stencel et al. Security in Kubernetes
Zhang et al. Security in network functions virtualization
Kotenko et al. Navigating the challenges and best practices in securing microservices architecture
Baranova Multi-Tenant Isolation in a Service Mesh
Rangta Tools for Security Auditing and Hardening in Microservices Architecture
de Jesus Silva Zero Trust Security for Microservices in Scalable Systems
Dongiovanni Zero Trust Network Security Model in Containerized Environments