z-logo
open-access-imgOpen Access
Kubernetes Security: A Quick Reference
Author(s) -
Sumayya A Shaikh,
Mohammad Mohabbat Khan,
Najib Baig Mirza,
Ahlam Ansari
Publication year - 2021
Publication title -
international journal of advanced research in science, communication and technology
Language(s) - English
Resource type - Journals
ISSN - 2581-9429
DOI - 10.48175/ijarsct-1152
Subject(s) - software deployment , product (mathematics) , computer science , computer security , customer base , new product development , business , software engineering , marketing , mathematics , geometry
A new product is like a newborn child. You can’t just develop it and let it be in the air, it must be protected. As the product ages, either it acquires a customer base or it dies. It becomes successful only when there is a great correlation among all the variables responsible to fall or grow up that product. This paper focuses on providing efficient tools to make the Kubernetes and its environment secure so that a deployed product is very much protected. Security of Kubernetes has become a trend [1]. We believe the paper can have a great impact on decision-making during the deployment of SaaS products.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here