AdvancedCloudContainersObservability

Kubernetes Security and Observability

A Holistic Approach to Securing Containers and Cloud-Native Applications

3 / 5

Brendan Creane and Amit Gupta's combined treatment of Kubernetes security and observability — RBAC, network policy, runtime detection, and the telemetry needed to make any of it operationally real.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2021
Publisher
O'Reilly Media
Pages
196
Language
English

Read this if

Platform engineers and SRE-security hybrids running production Kubernetes who want a single reference for the security-and-observability boundary. Strongest on the network-policy and runtime-detection sections, where most teams are weakest in practice.

Skip this if

Readers wanting depth on Kubernetes architecture itself, multi-tenancy patterns, or supply-chain (SLSA, signed images) detail. Also somewhat Calico-flavored — the authors are from Tigera — which is fine if you know to read past the marketing.

Key takeaways

  • Security without observability is unfalsifiable; the book's central argument is that they are one workstream, not two.
  • Network policy is operationally hard, not conceptually hard — the chapters on rolling out default-deny in production are the most useful.
  • Runtime detection is necessary because admission controllers cannot catch everything; the book treats the trade-off honestly.

Notes

Pair with Kubernetes Security (Rice / Hausenblas) for the lighter introduction and with Brendan Burns's Designing Distributed Systems for the architecture frame the security model assumes. CNCF's TAG-Security guidance and the latest CIS Kubernetes Benchmark are the ongoing-update companions. A stronger second book than first book; read after Container Security (Rice).