What's Next?
This lesson summarises what we have learned so far and what we are going to learn next.
Summary
Authorization and authentication are critical security components. Without a proper set of permissions, we are risking exposure with potentially devastating results. Moreover, with appropriate Rules, Roles, and RoleBindings, we can make a cluster not only more secure but also increase collaboration between different members of our organization. The only trick is to find a right balance between tight security and freedom. It takes time until that equilibrium is established.
RBAC combined with ...
Access this course and 1400+ top-rated courses and projects.