Chapter 3: Kubernetes security


Kubernetes hardening