Securing Charmed Kubernetes
The term 'security' covers a great many subtopics related to running a Kubernetes cluster, ranging from aspects of the workloads to the underlying OS. Please see the overview of security page for a better understanding of the approach to securing your cluster.
The guides in this section contain How tos for pursuing specific security goals:
- Authorisation and authentication
- Use Vault as a CA
- Authenticate with LDAP
- Use the OPA Gatekeeper
- Use encryption-at-rest