This resource is no longer available
Securing Kubernetes with zero trust authentication is complicated enough for a single cluster, never mind when managing hundreds or even thousands of K8s clusters.
This article breaks down how you can achieve the ideal zero trust security in your K8s clusters through best practices and the addition of popular open-source tools.
Read it here.