Cloud Native Systems Security Management
In this chapter, we will be diving into the various security solutions that should be implemented while developing cloud-native systems. Cloud-native systems have become increasingly popular in recent years, but with this increased adoption, security has become a critical concern. This chapter aims to provide you with a comprehensive understanding of the various tools and techniques that can be used to secure cloud-native systems, and how they can be integrated to provide a secure and compliant cloud-native environment.
In this chapter, we’re going to cover the following main topics:
- Secure configuration management using OPA
- Secure image management using Harbor
By the end of this chapter, you will be able to implement secure configuration management, secure image management, secure runtime management, secure network management, and Kubernetes admission controllers in their cloud-native systems. You will also be able...