Introduction
1. Introduction
Earlier in this course, you learned how to run workloads within a GKE cluster. Now you’ll focus on securing your cluster and applications by establishing appropriate access control mechanisms. This is essential for ensuring that only authorized users can perform specific actions within your GKE environment, thereby protecting your valuable resources. In this section titled, “Access Control and Security in Kubernetes and Google Kubernetes Engine”, you’ll explore Kubernetes authentication and authorization; examine Kubernetes role-based access controls and how it works with IAM to secure GKE clusters; configure Workload Identity to access Google Cloud services from within GKE; secure GKE with Kubernetes Pod Security Standards and Pod Security Admission; and implement Role-Based Access Control with GKE.2. Let's practice!
Create Your Free Account
or
By continuing, you accept our Terms of Use, our Privacy Policy and that your data is stored in the USA.