Table of Contents
- Kubernetes Architecture
- Kubernetes Networking
- Threat Modeling
- Applying the Principle of Least Privilege in Kubernetes
- Configuring Kubernetes Security Boundaries
- Securing Cluster Components
- Authentication, Authorization, and Admission Control
- Securing Kubernetes Pods
- Image Scanning in DevOps Pipelines
- Real-Time Monitoring and Resource Management of a Kubernetes Cluster
- Defense in Depth
- Analyzing and Detecting Crypto-Mining Attacks
- Learning from Kubernetes CVEs

