...

/

What's Next?

What's Next?

This lesson summarises what we have learned so far and what we are going to learn next.

Summary

Authorization and authentication are critical security components. Without a proper set of permissions, we are risking exposure with potentially devastating results. Moreover, with appropriate Rules, Roles, and RoleBindings, we can make a cluster not only more secure but also increase collaboration between different members of our organization. The only trick is to find a right balance between tight security and freedom. It takes time until that equilibrium is established.

RBAC combined with ...

Access this course and 1400+ top-rated courses and projects.