Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Book . 2025
License: CC BY NC ND
Data sources: ZENODO
ZENODO
Book . 2025
License: CC BY NC ND
Data sources: Datacite
ZENODO
Book . 2025
License: CC BY NC ND
Data sources: Datacite
versions View all 2 versions
addClaim

Docker and Kubernetes Security – Technical Companion

Authors: A'râbi, Mohammad-Ali;

Docker and Kubernetes Security – Technical Companion

Abstract

The Best DevOps Book of the Year finalist for DevOps Dozen 2025. In 2025, supply chain attacks, AI-driven threats, and sophisticated cloud-native exploits are more common than ever. This book is your up-to-date guide to defending Docker and Kubernetes in this new landscape, using the latest tools and techniques. Covering every layer of container security, you'll go from foundational concepts to hands-on implementations. Starting with a clear overview of Docker, Kubernetes, and Linux containers, you'll learn how to: Build secure container images with SBOMs and attestations using modern standards like OCI 1.1 referrers Integrate security into your GitHub Actions and GitLab CI/CD pipelines Enforce pod security policies and manage secrets with RBAC Monitor Kubernetes runtime activity with Falco and Grafana Detect vulnerabilities early using tools like Docker Scout, Trivy, and Snyk Apply shift-left security and even Gen AI approaches for smarter defenses Along the way, you'll tackle real-world challenges like scalability, disaster recovery, and securing multi-tenant clusters. With a focus on supply chain defense, you'll learn how to protect against the very same threats making headlines today—like the recent npm package compromises. By the end of this book, you'll be ready to address the full spectrum of container security challenges and future-proof your DevOps pipelines, ensuring your applications are robust, secure, and ready for production.

Keywords

Computer security

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average