API Security Big Picture
Explore the full security process for Kubernetes API requests, including authentication, role-based access control, and admission control. Understand how each stage ensures authorized and secure access to cluster resources.
We'll cover the following...
We'll cover the following...
Kubernetes is API-centric and the API is served through the API server. In this chapter, we’ll follow a typical API request as it passes through various security-related checks.
API security
All of the following make CRUD-style requests to the API server (create, read, update, delete):
Operators and developers using
kubectl...