# Security ## Table of contents 1. [Further readings](#further-readings) 1. [Sources](#sources) ## Further readings - [Kubernetes] - [Network policies] ## Sources All the references in the [further readings] section, plus the following: - [Canals and bridges: using Amsterdam's transit system to secure K8S networks by Cailyn Edwards] - [100,000 different ways to manage secrets in gitops by Andrew Block, Red Hat] [further readings]: #further-readings [kubernetes]: README.md [network policies]: network%20policies.md [100,000 different ways to manage secrets in gitops by andrew block, red hat]: https://www.youtube.com/watch?v=FVaaqP7_AJg [canals and bridges: using amsterdam's transit system to secure k8s networks by cailyn edwards]: https://www.youtube.com/watch?v=N1XvgWXnEik