Stencel et al., 2025 - Google Patents
Security in KubernetesStencel et al., 2025
- Document ID
- 6224719754611724374
- Author
- Stencel G
- Berton L
- Publication year
- Publication venue
- Kubernetes Recipes: A Practical Guide for Container Orchestration and Deployment
External Links
Snippet
This chapter provides a comprehensive guide to enhancing the security posture of Kubernetes environments. It covers a wide array of security practices designed to protect workloads, sensitive data, and network communications within the Kubernetes cluster. The …
- 238000004891 communication 0 abstract description 67
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zaheer et al. | eztrust: Network-independent zero-trust perimeterization for microservices | |
| Scott-Hayward et al. | A survey of security in software defined networks | |
| CN113810369B (en) | Device authentication based on tunnel client network request | |
| US8452881B2 (en) | System and method for bridging identities in a service oriented architecture | |
| Banse et al. | A secure northbound interface for SDN applications | |
| EP2332285B1 (en) | Methods and systems for securely managing virtualization platform | |
| US20140298419A1 (en) | System and method for bridging identities in a service oriented architectureprofiling | |
| EP1641215B1 (en) | System and method for bridging identities in a service oriented architecture | |
| EP2792104A1 (en) | Automated access, key, certificate, and credential management | |
| Beer et al. | Adaptive security architecture for protecting RESTful web services in enterprise computing environment | |
| Chandramouli et al. | Attribute-based access control for microservices-based applications using a service mesh | |
| US20240364689A1 (en) | Accessing Cloud Environments Through Administrative Tenancies To Comply With Sovereignty Requirements | |
| Liu et al. | DACAS: integration of attribute-based access control for northbound interface security in SDN | |
| Tseng et al. | A comprehensive 3‐dimensional security analysis of a controller in software‐defined networking | |
| Gudu et al. | Enabling secure shell access with openid connect | |
| WO2024227197A1 (en) | Accessing cloud environments through administrative tenancies to comply with sovereignty requirements | |
| RU2422886C2 (en) | Providing coordinated passage of firewall having application information | |
| Budigiri et al. | Zero-cost in-depth enforcement of network policies for low-latency cloud-native systems | |
| Stencel et al. | Security in Kubernetes | |
| Zhang et al. | Security in network functions virtualization | |
| Kotenko et al. | Navigating the challenges and best practices in securing microservices architecture | |
| Baranova | Multi-Tenant Isolation in a Service Mesh | |
| Rangta | Tools for Security Auditing and Hardening in Microservices Architecture | |
| de Jesus Silva | Zero Trust Security for Microservices in Scalable Systems | |
| Dongiovanni | Zero Trust Network Security Model in Containerized Environments |