Cloud
This refers to the whole infrastructure itself, regardless of if it is the “cloud” or not.
- Datacenter
- Network
- Servers
Cluster
- Authentication
- Authorization
- Admission
- Network Policy
Containers
- Restrict Images
- Supply Chain
- Sandboxing
- Privileged
Code
Code security best practices. Mostly out of scope for this training but we do cover some k8s specific topics.