Course Outline
Introduction
Overview of the Kubernetes API and Security Features
- Accessing HTTPS endpoints, the Kubernetes API, nodes, and containers
- Kubernetes Authentication and Authorization mechanisms
Understanding Attack Vectors
- How attackers locate your etcd port, Kubernetes API, and other services
- Techniques for executing code within containers
- Methods for privilege escalation
- Case study: The Tesla Kubernetes cluster exposure
Setting up Kubernetes
- Selecting the appropriate distribution
- Installation procedures
Managing Credentials and Secrets
- The credentials lifecycle
- Understanding secrets management
- Distributing credentials securely
Controlling Access to the Kubernetes API
- Encrypting API traffic using TLS
- Implementing authentication for API servers
- Implementing role-based authorization
Managing User and Workload Capabilities
- Understanding Kubernetes security policies
- Restricting resource consumption
- Limiting container privileges
- Controlling network access
Securing Node Access
- Isolating workload access
Protecting Cluster Components
- Restricting access to etcd
- Disabling unnecessary features
- Managing, removing, and revoking credentials and tokens
Securing Container Images
- Managing Docker and Kubernetes images
- Constructing secure images
Managing Cloud Resource Access
- Understanding cloud platform metadata
- Limiting permissions for cloud resources
Evaluating Third-Party Integrations
- Minimizing permissions for third-party software
- Assessing components that can create pods
Establishing a Security Policy
- Reviewing existing security profiles
- Creating a security model
- Cloud-native security considerations
- Additional best practices
Encrypting Data at Rest
- Encrypting backups
- Encrypting full disk storage
- Encrypting secret resources within etcd
Monitoring and Auditing
- Enabling audit logging
- Auditing and governing the software supply chain
- Subscribing to security alerts and updates
Summary and Conclusion
Requirements
- Prior experience working with Kubernetes
Target Audience
- DevOps engineers
- Software developers
Testimonials (3)
About the microservices and how to maintenance kubernetes
Yufri Isnaini Rochmat Maulana - Bank Indonesia
Course - Advanced Platform Engineering: Scaling with Microservices and Kubernetes
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
The knowledge and the patience from the trainer to answer to our questions.