Table of Contents
- Kubernetes Architecture
- Kubernetes Networking
- Threat Modeling
- Applying the Principle of Least Privilege in Kubernetes
- Configuring Kubernetes Security Boundaries
- Securing Cluster Components
- Authentication, Authorization, and Admission Control
- Securing Pods
- Shift Left (Scanning, SBOM, and CI/CD)
- Real-Time Monitoring and Observability
- Security Monitoring and Log Analysis
- Defense in Depth
- Kubernetes Vulnerabilities and Container Escapes
- Third-Party Plugins for Securing Kubernetes

