Course Outline
Introduction
Overview of the Kubernetes API and Security Features
- Access to HTTPS endpoints, Kubernetes API, nodes, and containers
- Kubernetes Authentication and Authorization features
Understanding Cluster Attack Vectors
- How attackers locate your etcd port, Kubernetes API, and other services
- Methods hackers use to execute code inside your containers
- Techniques for privilege escalation by attackers
- Case study: Analysis of how Tesla exposed its Kubernetes cluster
Setting up Kubernetes
- Selecting an appropriate distribution
- Installing Kubernetes
Using Credentials and Secrets
- The credential lifecycle
- Understanding secrets
- Distributing credentials securely
Controlling Access to the Kubernetes API
- Encrypting API traffic with TLS
- Implementing authentication for API servers
- Implementing authorization for various roles
Managing User and Workload Capabilities
- Understanding Kubernetes policies
- Limiting resource usage
- Restricting container privileges
- Controlling network access
Controlling access to nodes
- Separating workload access
Protecting Cluster Components
- Restricting access to etcd
- Disabling unnecessary features
- Changing, removing and revoking credentials and tokens
Securing Container Images
- Managing Docker and Kubernetes images
- Building secure images
Controlling Access to Cloud Resources
- Understanding cloud platform metadata
- Limiting permissions to cloud resources
Evaluating Third Party Integrations
- Minimizing the permissions granted to third party software
- Evaluating components that can create pods
Establishing a Security Policy
- Reviewing the existing security profile
- Creating a security model
- Cloud native security considerations
- Other best practices
Encrypting Inactive Data
- Encrypting backups
- Encrypting the entire disk
- Encrypting secret resources in etcd
Monitoring Activity
- Enabling audit logging
- Auditing and governing the software supply chain
- Subscribing to security alerts and updates
Summary and Conclusion
Requirements
- Previous experience working with Kubernetes
Target Audience
- DevOps engineers
- Developers
Testimonials (4)
About the microservices and how to maintenance kubernetes
Yufri Isnaini Rochmat Maulana - Bank Indonesia
Course - Advanced Platform Engineering: Scaling with Microservices and Kubernetes
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
his empathy and ability to translate complex concepts into easily understandable cases
Giorgio - Accenture Italia
Course - Certified Kubernetes Security Specialist (CKS)
Machine Translated
The knowledge and the patience from the trainer to answer to our questions.