Securing Kubernetes Secrets (Cloud Next '19)

Secrets are a key pillar of Kubernetes’ security model, used internally (e.g. service accounts) and by users (e.g. API keys), but did you know they are stored in plaintext? That’s right, by default all Kubernetes secrets are base64 encoded and stored as plaintext in etcd. Anyone with access to the etcd cluster has access to all your Kubernetes secrets.

Thankfully there are better ways. This lecture provides an overview of different techniques for more securely managing secrets in Kubernetes, including secrets encryption, KMS plugins, and tools like HashiCorp Vault. Attendees will learn the trade-offs of each approach to make better decisions on how to secure their Kubernetes clusters.

Securing Kubernetes Secrets →
Application-layer Secrets Encryption →

Watch more:
Next ’19 Hybrid Cloud Sessions here →
Next ‘19 All Sessions playlist →

Subscribe to the GCP Channel →

Speaker(s): Seth Vargo, Alexandr Tcherniakhovski

Session ID: HYB200
product:Kubernetes Engine,Cloud KMS; fullname:Alexandr Tcherniakhovski,Seth Vargo;

Duration: 42:27
Publisher: Google Cloud
You can watch this video also at the source.

Inxy Hosting CDN Marketplace