Definitive Guide to Google Kubernetes Engine (GKE) Security
Kubernetes brings some specific security requirements to the table. For a managed Kubernetes service like GKE, users have three main layers that require action: the workloads running on the cluster, the cluster and its components, and the underlying GCP services on which the cluster depends, and more.
Lack of adequate security for any one of these areas puts them all at risk and leaves the integrity of the cluster and its workloads in danger.
Download this eBook as a guide to general Kubernetes cluster security, including the standard controls and best practices for minimizing the risk around cluster workloads,and the specific requirements for securing a GKE cluster with associated infrastructure.