Introduction to securing cluster access


Hardening your cluster’s security → https://goo.gle/3og3K2I
Understanding IAM custom roles → https://goo.gle/31kDRWV
Configuring role-based access control → https://goo.gle/32O570d

In this episode of GKE Essentials, Anthony Bushong covers some best practices for securing access to your GKE cluster. From the principle of least privilege to defining cluster access, watch to learn how you can leverage the GKE API and Kubernetes Control Plane to secure access and ensure that users only have the access they need, and nothing more!

Chapters:
0:00 – Intro
0:19 – Cluster Access Overview
1:06 – Securing Access to a Cluster
4:23 – Authorized Networks
5:10 – Recap

Adding authorized networks for control plane access → https://goo.gle/3pn6A5p

Check out more GKE Essentials → https://goo.gle/GKEEssentials
Subscribe to Google Cloud Tech → http://goo.gle/GoogleCloudTech

#GKEEssentials

product: Cloud – Containers – Google Kubernetes Engine (GKE); fullname: Anthony Bushong


Duration: 00:05:55
Publisher: Google Cloud
You can watch this video also at the source.


Inxy Hosting CDN Marketplace