Table of Contents

Security Primitives

Secure Hosts

Secure Kubernetes

Authentication

Who can access?

Authorization

What can they do?

TLS Certificates