Certified Kubernetes Security Specialist Masterclass
- Description
- Curriculum
- FAQ
- Reviews
Cluster SetupUse Network security policies to restrict cluster level accessUse CIS benchmark to review the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi)Properly set up Ingress objects with security controlProtect node metadata and endpointsMinimize use of, and access to, GUI elementsVerify platform binaries before deployingCluster HardeningRestrict access to Kubernetes APIUse Role Based Access Controls to minimize exposureExercise caution in using service accounts e.g. disable defaults, minimize permissions on newly created onesUpdate Kubernetes frequentlySystem HardeningMinimize host OS footprint (reduce attack surface)Minimize IAM rolesMinimize external access to the networkAppropriately use kernel hardening tools such as AppArmor, seccompMinimize Microservice VulnerabilitiesSetup appropriate OS level security domainsManage Kubernetes secretsUse container runtime sandboxes in multi-tenant environments (e.g. gvisor, kata containers)Implement pod to pod encryption by use of mTLSSupply Chain SecurityMinimize base image footprintSecure your supply chain: whitelist allowed registries, sign and validate imagesUse static analysis of user workloads (e.g.Kubernetes resources, Docker files)Scan images for known vulnerabilitiesMonitoring, Logging and Runtime SecurityPerform behavioral analytics of syscall process and file activities at the host and container level to detect malicious activitiesDetect threats within physical infrastructure, apps, networks, data, users and workloadsDetect all phases of attack regardless where it occurs and how it spreadsPerform deep analytical investigation and identification of bad actors within environmentEnsure immutability of containers at runtimeUse Audit Logs to monitor access
-
1CKS Exam Strategy, Tips & TricksVideo lesson
-
2Trivy IntroductionVideo lesson
-
3Trivy - Scan PodsVideo lesson
-
4Extract Secrets & Save to a FileVideo lesson
-
5gVisor DemoVideo lesson
-
6CIS Benchmarks for Hardening a Kubernetes ClusterVideo lesson
-
7Fix Dockerfile and Deployment.yaml for any security vulnerabilitiesVideo lesson
-
8Enable AuditingVideo lesson
-
9FalcoVideo lesson
-
10AppArmorVideo lesson
-
11Gatekeeper or Open Policy AgentVideo lesson
-
12PodSecurityPolicyVideo lesson
-
13Fix Incorrectly Specified ServiceAccount in a Pod, Create Role, Rolebinding etc.Video lesson
-
14Fix Overly Permissive Permissions for Pod's SA & Create SA, Role, RolebindingsVideo lesson
-
15Scenario Based Question - Admission Controller - Image ScannerVideo lesson
-
16Scenario Based Question - Network Policies - 1Video lesson
-
17Scenario Based Question - Network Policies - 2Video lesson
-
18Scenario Based Question - Verify Platform BinariesVideo lesson
-
19Read Kubernetes Secrets from ETCDVideo lesson
-
20Create & Secure an IngressVideo lesson

External Links May Contain Affiliate Links read more