Home Conference Sessions Getting to Grips...

Getting to Grips with Kubernetes RBAC

Liz Rice | GOTO Amsterdam 2019

You need to be signed in to add a collection

Whether you're just getting started with Kubernetes, or you have spent time administering access controls on your cluster, you will probably have at least heard the term RBAC. It's an important concept to get to grips with since it's the critical security feature that controls who can perform different actions in your cluster. This talk aims to demystify how Role-Based Access Control (RBAC) works on Kubernetes, by comparing it with file permissions in Linux, and exploring the extra abstractions and complexities that RBAC uses. **What will the audience learn from this talk?**<br> The audience will leave with a grounding in how Kubernetes RBAC works, and the different resources involved. More importantly this understanding will help the audience use RBAC more effectively, and avoid some of the pitfalls that can render it less effective in securing a cluster. **Does it feature code examples and/or live coding?**<br> Yes **Prerequisite attendee experience level:** <br> [Level 200](https://gotoams.nl/2019/pages/experience-level)

Share on:
linkedin facebook
Copied!

Transcript

Whether you're just getting started with Kubernetes, or you have spent time administering access controls on your cluster, you will probably have at least heard the term RBAC. It's an important concept to get to grips with since it's the critical security feature that controls who can perform different actions in your cluster. This talk aims to demystify how Role-Based Access Control (RBAC) works on Kubernetes, by comparing it with file permissions in Linux, and exploring the extra abstractions and complexities that RBAC uses.

What will the audience learn from this talk?
The audience will leave with a grounding in how Kubernetes RBAC works, and the different resources involved. More importantly this understanding will help the audience use RBAC more effectively, and avoid some of the pitfalls that can render it less effective in securing a cluster.

Does it feature code examples and/or live coding?
Yes

Prerequisite attendee experience level:
Level 200

About the speakers

Liz Rice

Liz Rice

VP of open source engineering at Aqua Security

Related topics