Get in Touch

Course Outline

Introduction

Overview of the Kubernetes API and Security Features

  • Accessing HTTPS endpoints, the Kubernetes API, nodes, and containers
  • Kubernetes Authentication and Authorization mechanisms

Understanding Attack Vectors

  • How attackers locate your etcd port, Kubernetes API, and other services
  • Techniques for executing code within containers
  • Methods for privilege escalation
  • Case study: The Tesla Kubernetes cluster exposure

Setting up Kubernetes

  • Selecting the appropriate distribution
  • Installation procedures

Managing Credentials and Secrets

  • The credentials lifecycle
  • Understanding secrets management
  • Distributing credentials securely

Controlling Access to the Kubernetes API

  • Encrypting API traffic using TLS
  • Implementing authentication for API servers
  • Implementing role-based authorization

Managing User and Workload Capabilities

  • Understanding Kubernetes security policies
  • Restricting resource consumption
  • Limiting container privileges
  • Controlling network access

Securing Node Access

  • Isolating workload access

Protecting Cluster Components

  • Restricting access to etcd
  • Disabling unnecessary features
  • Managing, removing, and revoking credentials and tokens

Securing Container Images

  • Managing Docker and Kubernetes images
  • Constructing secure images

Managing Cloud Resource Access

  • Understanding cloud platform metadata
  • Limiting permissions for cloud resources

Evaluating Third-Party Integrations

  • Minimizing permissions for third-party software
  • Assessing components that can create pods

Establishing a Security Policy

  • Reviewing existing security profiles
  • Creating a security model
  • Cloud-native security considerations
  • Additional best practices

Encrypting Data at Rest

  • Encrypting backups
  • Encrypting full disk storage
  • Encrypting secret resources within etcd

Monitoring and Auditing

  • Enabling audit logging
  • Auditing and governing the software supply chain
  • Subscribing to security alerts and updates

Summary and Conclusion

Requirements

  • Prior experience working with Kubernetes

Target Audience

  • DevOps engineers
  • Software developers
 14 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories