Eugenio Uccheddu
Hi all,
as the title suggests I’ve reached the way to secure a k8s cluster behind a VPN.
Yep, there is not strictly connected with the course, but how Nigel said in the last parts, we need to see more case studies before to go in production. You guys have some materials/books or articles can explode the argument? (every security practices linked are welcome).
Thanks a lot for your time!