In Kubernetes Secrets Management you will find:
Strategies for storing secure assets in Kubernetes
Cryptographic options and how to apply them in Kubernetes
Using the HashiCorp Vault server on Kubernetes for secure secrets storage
Managing security with public cloud providers
Applying security concepts using tools from the Kubernetes ecosystem
End-to-end secrets storage from development to operations
Implementing in Kubernetes in CI/CD systems
Secrets, like database passwords and API keys, are some of the most important data in your application. Kubernetes Secrets Management reveals how to store these sensitive assets in Kubernetes in a way that’s protected against leaks and hacks. You’ll learn the default capabilities of Kubernetes secrets, where they’re lacking, and alternative options to strengthen applications and infrastructure. Discover a security-first mindset that is vital for storing and using secrets correctly, and tools and concepts that will help you manage sensitive assets such as certificates, keys, and key rotation.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
About the technology
Kubernetes relies on passwords, tokens, keys, certificates, and other sensitive information to keep your system secure. But how do you keep these “secrets” safe? In this concise, practical book you’ll learn secrets management techniques that go far beyond the Kubernetes defaults.
About the book
Kubernetes Secrets Management reveals security best practices and reliable third-party tools for protecting sensitive data in Kubernetes-based systems. In this focused guide, you’ll explore relevant, real-world examples like protecting secrets in a code repository, securing keys with HashiCorp Vault, and adding layers to maintain protection after a breach. Along the way, you’ll pick up secrets management techniques you can use outside Kubernetes, as well.
What's inside
Cryptographic options you can apply in Kubernetes
Managing security with public cloud providers
Secrets storage, from development to production
End-to-end Kubernetes secrets management in CI/CD systems
About the reader
For readers experienced with Kubernetes and CI/CD practices.
Table of Contents
PART 1 SECRETS AND KUBERNETES
1 Kubernetes Secrets
2 An introduction to Kubernetes and Secrets
PART 2 MANAGING SECRETS
3 Securely storing Secrets
4 Encrypting data at rest
5 HashiCorp Vault and Kubernetes
6 Accessing cloud secrets stores
PART 3 CONTINUOUS INTEGRATION AND CONTINUOUS DELIVERY
7 Kubernetes-native continuous integration and Secrets
8 Kubernetes-native continuous delivery and Secrets
About the Author
Alex Soto Bueno is a director of developer experience at Red Hat, a Java Champion since 2007, an international speaker, and a teacher at Salle URL University.
Andrew Block is a distinguished architect with Red Hat who works with organizations to design and implement solutions leveraging cloud native technologies. He is active in the open-source community as both a presenter and contributor.
Ebook License
End-User Warranty And License Agreement
1. Grant Of License
Manning Has Authorized The Download By You Of An Unrestricted Number Of Copies Of The Electronic Book (Ebook) In Any Of The Available Formats. Manning Grants You A Nonexclusive, Nontransferable License To Use The Ebook According To The Terms And Conditions Herein. This License Agreement Permits You To Install The Ebook On Any And All Your Devices For Your Personal Use Only.
2. Restrictions
You Shall Not: (1) Share, Resell, Rent, Assign, Timeshare, Distribute, Or Transfer All Or Part Of The Ebook Or Any Rights Granted Hereunder To Any Other Person; (2) Duplicate The Ebook, Except For A Single Backup Or Archival Copy; (3) Remove Any Proprietary Notices, Labels, Or Marks From The Ebook; (4) Transfer Or Sublicense Title To The Ebook To Any Other Party.
3. Intellectual Property Protection
The Ebook Is Owned By Manning And Is Protected By United States And International Copyright And Other Intellectual Property Laws. Manning Reserves All Rights In The Ebook Not Expressly Granted Herein. This License And Your Right To Use The Ebook Terminate Automatically If You Violate Any Part Of This Agreement. In The Event Of Termination, You Must Remove The Original And Any Copies Of The Ebook From All Your Devices.
4. Source Code Supplementary Material
Any Source Code Files Provided As A Supplement To The Book Are Freely Available To The Public For Download. Reuse Of The Code Is Permitted, In Whole Or In Part, Including The Creation Of Derivative Works, Provided That You Acknowledge That You Are Using It And Identify The Source: Title, Publisher And Year.
5. Limited Warranty
Manning Warrants That The Ebook Files, A Copy Of Which You Are Authorized To Download, Are Free From Defects In The Operational Sense That They Can Be Read By A Pdf Reader Or Epub Reader, Or Other. Except For This Express Limited Warranty, Manning Makes And You Receive No Warranties, Express, Implied, Statutory Or In Any Communication With You, And Manning Specifically Disclaims Any Other Warranty Including The Implied Warranty Of Merchantability Or Fitness Or A Particular Purpose. Manning Does Not Warrant That The Operation Of The Ebook Will Be Uninterrupted Or Error Free. If The Ebook Was Purchased In The United States, The Above Exclusions May Not Apply To You As Some States Do Not Allow The Exclusion Of Implied Warranties. In Addition To The Above Warranty Rights, You May Also Have Other Rights That Vary From State To State.
6. Limitation Of Liability
In No Event Will Manning Be Liable For Any Damages, Whether Arising For Tort Or Contract, Including Loss Of Data, Lost Profits, Or Other Special, Incidental, Consequential, Or Indirect Damages Arising Out Of The Use Or Inability To Use The Ebook.
7. General
This Agreement Constitutes The Entire Agreement Between You And Manning And Supersedes Any Prior Agreement Concerning The Ebook. This Agreement Is Governed By The Laws Of The State Of New York.