Information security protection method and system for secure resources in k8s
A technology of information security and protection system, applied in the field of information security protection of secret resources in k8s, can solve the problems of insecure secret resource information, few security protection measures of secret resource information, etc., and achieve the effect of avoiding the inability to encrypt
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0064] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0065] The main technical problems of the embodiments of the present invention are as follows:
[0066] k8s contains secret resources: the secret resources are used to store sensitive information such as user names, passwords, digital certificates, private keys, tokens, and ssh keys, so as to support various application instances through secret resources. However, at present, k8s only base64-encodes secret resources once, and does not actually encrypt sensitive information. This is not safe for sensitive information. Attackers can obtain original data information through simple base64 anti-encoding tools.
[0067] In order to solve the above problems, see figure 1 , figure 1 A schematic flowchart of an information security protection method for secret resources in k8s provided by an embodiment of the present inventi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


