Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Configuring and Managing Kubernetes Security

Kubernetes security is critical but complex. This course teaches you how to implement RBAC, secure container images, enforce policies, manage secrets, and control network traffic to protect your Kubernetes clusters and applications.

Intermediate
51m

Created by Elton Stoneman

Last Updated Dec 17, 2025

Course Thumbnail
  • Course

Configuring and Managing Kubernetes Security

Kubernetes security is critical but complex. This course teaches you how to implement RBAC, secure container images, enforce policies, manage secrets, and control network traffic to protect your Kubernetes clusters and applications.

Intermediate
51m

Created by Elton Stoneman

Last Updated Dec 17, 2025

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Core Tech
What you'll learn

Running Kubernetes without proper security controls exposes your infrastructure to significant risks — from unauthorized access to data breaches and compromised containers. In this course, Configuring and Managing Kubernetes Security, you'll learn to implement comprehensive security controls for production Kubernetes environments. First, you'll explore securing cluster access through Role-based Access Control (RBAC) for service accounts and implementing Multi-factor Authentication (MFA) for end users. Next, you'll discover how to secure the applications running in your cluster by scanning container images for vulnerabilities and enforcing security policies inside the cluster. Finally, you'll learn how to protect application communication using Network Policies to control traffic flow and implement secure secrets management with the Secrets Store CSI Driver. When you're finished with this course, you'll have the skills and knowledge to implement defense-in-depth security for Kubernetes, protecting your clusters from common attack vectors while maintaining operational efficiency.

Configuring and Managing Kubernetes Security
Intermediate
51m
Table of contents

About the author
Elton Stoneman - Pluralsight course - Configuring and Managing Kubernetes Security
Elton Stoneman
40 courses 4.5 author rating 5987 ratings

Elton is an independent consultant specializing in systems integration with the Microsoft stack. He is a Microsoft MVP, blogger, and practicing Technical Architect.

Get started with Pluralsight