Terminology review
- Understanding authentication
- Understanding Role-based Access Control (RBAC)
- Understanding Runtime Security
- Understanding Pod Security Standards
- Understanding Encryption and Secret Management
Hands-on
- Using Roles and RoleBindings
- Configuring the Container’s Security Context
- Encrypting Secrets
super