// Comparison

Kubernetes Security vs Security Chaos Engineering: Which Should You Read?

Two cybersecurity books on DevSecOps, compared honestly: who each is for, what each does best, and which to read first.

Intermediate
4/52018
Kubernetes Security

Liz Rice, Michael Hausenblas

Liz Rice and Michael Hausenblas's freely-available O'Reilly short on the Kubernetes-specific security model: API server, RBAC, network policy, secrets, and the typical hardening steps that move a cluster from default to defensible.

Advanced
5/52023
Security Chaos Engineering

Sustaining Resilience in Software and Systems

Kelly Shortridge, Aaron Rinehart

Kelly Shortridge and Aaron Rinehart on treating security as a property of complex adaptive systems: instead of preventing failure, you continuously simulate it, and design the organization to learn from each result.

Read this if

Engineers spinning up their first production cluster who need the 99-page distillation of what to do before the first incident. The freely available PDF makes it the obvious 'send to the team' reference for Kubernetes hardening basics.
Security architects, SREs, and platform engineers ready to abandon the prevention-first frame. Particularly strong for organizations that already practice chaos engineering for reliability and want to extend the discipline to security; the book is the bridge.

Skip this if

Readers needing depth on runtime detection, supply-chain integrity, multi-cluster identity, or service-mesh security; the book is deliberately a primer, not a comprehensive reference. By 2026 Pod Security Admission, Gateway API, and signed-image standards have moved past the book's coverage.
Practitioners working in heavily regulated environments where intentional production faults are not legal, or smaller organizations without the operational maturity to run game days safely. Also a poor first security book: it assumes you know what threat models, blast radius, and feedback loops are.

Key takeaways

  • The Kubernetes security model is API-server-centric — most attacks are RBAC and network-policy failures, and the book makes this its spine.
  • Default-deny network policy is the highest-leverage hardening step in any cluster, and the book's framing of why is the most quotable in print.
  • Treat it as the on-ramp — once you have the basics, graduate to Kubernetes Security and Observability (Creane / Gupta) and current CNCF guidance.
  • Security and reliability share the same root engineering problem: how to keep complex systems within tolerable bounds when the failure surface is unbounded.
  • Decision trees and effort-vs-impact analysis are operationalizable artifacts, not just blog material; the book teaches you to actually use them.
  • Continuous experimentation is more honest than tabletop exercises: production tells you what is true, runbooks tell you what someone wished were true.

How they compare

We rate Security Chaos Engineering higher (5/5 against 4/5 for Kubernetes Security). For most readers, that means Security Chaos Engineering is the primary pick and Kubernetes Security is a useful follow-up.

Kubernetes Security is pitched at intermediate level. Security Chaos Engineering is pitched at advanced level. Read the easier one first if you're not yet comfortable with the topic.

Kubernetes Security and Security Chaos Engineering both cover DevSecOps, so reading them in sequence reinforces the same material from different angles.

Keep reading

Related topics