Видео с ютуба K8S Security
Kubernetes Security Best Practices you need to know | THE Guide for securing your K8s cluster!
Kubernetes Security Best Practices - Ian Lewis, Google
Kubernetes CKS Full Course Theory + Practice + Browser Scenarios
Kubernetes Hacking: From Weak Applications to Cluster Control
Container Security Explained
Kubernetes Security: Solving Common Challenges
Kubernetes Security Best Practices - Ian Lewis, Google
Kubernetes Security
Securing Kubernetes | 5 Tips
Securing Access to Kubernetes Infrastructure with Kubernetes Zero Trust Principles - Mohan Atreya
Zero trust network security for Kubernetes with Sysdig
Hacking into Kubernetes Security for Beginners - Ellen Körbes, Tilt & Tabitha Sable, Datadog
microXchg 2018 - Continuous Kubernetes Security - Andrew Martin
Kubernetes Security - Relevancy
Kubernetes Security tools(DevSecOps keynote) | cloud native security | Falco | Kubescape | Terrascan
Isolate the Users! Supporting User Namespaces in K8s for Increased Security - Mauricio Vásquez
Mastering Tracee: Real-time K8s Security with eBPF | Kubernetes Security Series
Kubernetes Security Posture Management