Introduction to securing cluster access

10 451
18.3
Опубликовано 4 декабря 2021, 5:00
In this episode of GKE Essentials, Anthony Bushong covers some best practices for securing access to your GKE cluster. From the principle of least privilege to defining cluster access, watch to learn how you can leverage the GKE API and Kubernetes Control Plane to secure access and ensure that users only have the access they need, and nothing more!

Chapters:
0:00 - Intro
0:19 - Cluster Access Overview
1:06 - Securing Access to a Cluster
4:23 - Authorized Networks
5:10 - Recap

Hardening your cluster's security → goo.gle/3og3K2I
Understanding IAM custom roles → goo.gle/31kDRWV
Configuring role-based access control → goo.gle/32O570d
Adding authorized networks for control plane access → goo.gle/3pn6A5p

Check out more GKE Essentials → goo.gle/GKEEssentials
Subscribe to Google Cloud Tech → goo.gle/GoogleCloudTech

#GKEEssentials

product: Cloud - Containers - Google Kubernetes Engine (GKE); fullname: Anthony Bushong
автотехномузыкадетское