Google Kubernetes Engine Best Practices: Security

Advanced 6 étapes 7 heures 44 crédits

Get Anthos Ready. This second Google Kubernetes Engine-centric Quest of best practices hands-on labs focuses on security at scale when deploying and managing production GKE environments -- specifically role-based access control, hardening, VPC networking, and binary authorization.

Infrastructure Security

Prérequis :

It is recommended that students have completed the first Quest in this series Google Kubernetes Best Practices before attempting these labs.

Quest Outline

Atelier pratique

Migration GKE vers des conteneurs

Cet atelier vous propose un tutoriel de base sur la migration de l'exécution d'une application sans état depuis une machine virtuelle vers Kubernetes Engine (GKE). Il vous présentera le cycle de vie d'une application effectuant une migration depuis un déploiement s'appuyant sur une machine virtuelle ou un système d'exploitation classique vers trois plates-formes d'infrastructure cloud en conteneurs différentes.

Deutsch English español (Latinoamérica) français 日本語 português (Brasil)
Atelier pratique

How to Use a Network Policy on Google Kubernetes Engine

In this lab you learn how to improve the security of your Kubernetes Engine by applying fine-grained restrictions to limit intra-cluster network communication.

Atelier pratique

Using Role-based Access Control in Kubernetes Engine

After provisioning two service accounts to represent user personas and three namespaces: dev, test, and prod, you will test the access controls of the personals in each namespace.

Atelier pratique

Google Kubernetes Engine Security: Binary Authorization

This lab deploys a Kubernetes Engine Cluster with the Binary Authorization feature enabled; you'll learn how to whitelist approved container registries and the process of creating and running a signed container.

Atelier pratique

Securing Applications on Kubernetes Engine - Three Examples

In this lab you will learn how Kubernetes Engine security features can be used to grant varying levels of privilege to applications based on their particular requirements

Atelier pratique

Hardening Default GKE Cluster Configurations

This lab demonstrates some of the security concerns of a default GKE cluster configuration and the corresponding hardening measures to prevent multiple paths of pod escape and cluster privilege escalation


Inscrivez-vous à cette quête pour suivre votre progression en matière de badge.