From the course: Kubernetes and Cloud Native Security Associate (KCSA) Cert Prep

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

What is infrastructure security?

What is infrastructure security?

Now, from an infrastructure security perspective, it's going to be a little bit different, but at the same time the same in many ways. So first, network access to the API server. You want to ensure that whoever is hitting the API server, whether they're running kubectl apply or kubectl get, is supposed to have access, network access to the nodes themselves, which ultimately they should only be accepting connections via network access and control list. We're going to be talking about network policies and how we can handle that later on. Kubernetes access to the cloud provider API, which is going to be managed Kubernetes services, access to etcd, which is the database for Kubernetes, the data store, and then encrypting etcd. Now what I will say is this, for example, access to etcd. You're not managing etcd when it comes to a managed Kubernetes service like AKS, EKS, GKE, but you still of course have the ability to specify who has access to what components, what nodes have access, what…

Contents