Chapter 5: Runtime Admission Controls This chapter highlights the significance of Runtime Admission Controls (RACs), which add a layer of protection by ensuring compliance and verification post-admission controller's approval. It introduces open-source solutions like OPA Gatekeeper and Kyverno for implementing 5admission control in Kubernetes. It discusses how Uptycs integrates with these tools to act as an actual admission controller, providing visibility into admission failures and audits. Chapter 6: Authorization, Access, and Secrets Chapter 6 delves into managing authorization, access, and secrets in Kubernetes environments. It explains the Role-Based Access Control (RBAC) mechanism for managing access to Kubernetes resources. The native admission control provided by Uptycs for image and runtime 6deployments, which allows blocking images with critical or high vulnerabilities and enforcing policies based on business needs, is discussed. This chapter also covers Uptycs' integration with registry scanning to prevent the use of vulnerable images for container deployments. Chapter 7: Real-time Detections & Auditing This chapter emphasizes the importance of real-time detection and auditing capabilities for Kubernetes environments. It elaborates on Uptycs' single console view for triaging and generating evidence for compliance issues. The platform's ability to perform continuous posture 7 checks on existing and new infrastructure, providing remediation information and real-time evidence, is detailed. Chapter 8: Securing Your Kubernetes Environments via Network Policies The final chapter discusses securing Kubernetes environments using network policies. It explores Uptycs' ability to provide visibility into pod- to-pod communication, detect unauthorized network connections, and monitor traffic for security threats. The platform's integration with 8open-source solutions like Calico, Cilium, and Istio is detailed for implementing and managing network policies in Kubernetes environments. Overall, this chapter highlights how Uptycs can enhance your Kubernetes environment's security posture by providing comprehensive network security capabilities. Mastering Kubernetes Security | An Uptycs e-book 4
Mastering Kubernetes Security | Short Version Page 3 Page 5