arrow_back
share

Google Kubernetes Engine Best Practices: Security

date_range 7시간 show_chart Advanced universal_currency_alt 크레딧 44개

Get Anthos Ready. This second Google Kubernetes Engine-centric Quest of best practices hands-on labs focuses on security at scale when deploying and managing production GKE environments -- specifically role-based access control, hardening, VPC networking, and binary authorization. Looking for a hands on challenge lab to demonstrate your skills and validate your knowledge? On completing this quest, enroll in and finish the additional challenge lab at the end of this quest to receive an exclusive Google Cloud digital badge.

배지 획득에 대한 진행 상황을 추적하려면 이 퀘스트에 등록하세요.
Enroll in this on-demand quest
  • 실습

    Migrating to GKE Containers

    This lab teaches you how to migrate a stateless application from running on a VM to running on Kubernetes Engine (GKE). You will learn about the lifecycle of an application transitioning from a typical VM/OS-based deployment to three different containerized cloud infrastructure platforms.

  • 실습

    How to Use a Network Policy on Google Kubernetes Engine

    In this lab you learn how to improve the security of your Kubernetes Engine by applying fine-grained restrictions to limit intra-cluster network communication.

  • 실습

    warning Using Role-based Access Control in Kubernetes Engine

    After provisioning two service accounts to represent user personas and three namespaces: dev, test, and prod, you will test the access controls of the personals in each namespace.

  • 실습

    Google Kubernetes Engine Security: Binary Authorization

    This lab deploys a Kubernetes Engine Cluster with the Binary Authorization feature enabled; you'll learn how to whitelist approved container registries and the process of creating and running a signed container.

  • 실습

    warning Securing Applications on Kubernetes Engine - Three Examples

    In this lab you will learn how Kubernetes Engine security features can be used to grant varying levels of privilege to applications based on their particular requirements

  • 실습

    Hardening Default GKE Cluster Configurations

    This lab demonstrates some of the security concerns of a default GKE cluster configuration and the corresponding hardening measures to prevent multiple paths of pod escape and cluster privilege escalation

  • info
    Quest Info
    Prerequisites
    It is recommended that students have completed the first Quest in this series Google Kubernetes Best Practices before attempting these labs.