Get in Touch

Course Outline

Introduction

Cluster Setup

  • Utilize network security policies to restrict cluster-level access.
  • Apply CIS benchmarks to review the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi).
  • Configure Ingress objects with appropriate security controls.
  • Safeguard node metadata and endpoints.
  • Minimize the use of and access to GUI elements.
  • Verify platform binaries prior to deployment.

Cluster Hardening

  • Restrict access to the Kubernetes API.
  • Employ Role-Based Access Control (RBAC) to minimize exposure.
  • Exercise caution when using service accounts, such as disabling defaults and minimizing permissions on newly created ones.
  • Keep Kubernetes updated frequently.

System Hardening

  • Reduce the host OS footprint to decrease the attack surface.
  • Minimize IAM roles.
  • Minimize external network access.
  • Effectively utilize kernel hardening tools such as AppArmor and seccomp.

Minimizing Microservice Vulnerabilities

  • Establish appropriate OS-level security domains, e.g., using PSP, OPA, and security contexts.
  • Manage Kubernetes secrets securely.
  • Employ container runtime sandboxes in multi-tenant environments (e.g., gvisor, Kata Containers).
  • Implement pod-to-pod encryption using mTLS.

Supply Chain Security

  • Minimize the base image footprint.
  • Secure your supply chain by whitelisting allowed image registries and signing/validating images.
  • Conduct static analysis of user workloads (e.g., Kubernetes resources, Dockerfiles).
  • Scan images for known vulnerabilities.

Monitoring, Logging, and Runtime Security

  • Perform behavioral analytics of syscall processes and file activities at the host and container levels to detect malicious activities.
  • Detect threats within physical infrastructure, applications, networks, data, users, and workloads.
  • Identify all phases of an attack, regardless of its origin or propagation method.
  • Conduct deep analytical investigations to identify bad actors within the environment.
  • Ensure container immutability at runtime.
  • Utilize Audit Logs to monitor access.

Summary and Conclusion

Requirements

  • CKA (Certified Kubernetes Administrator) certification

Audience

  • Kubernetes practitioners
 21 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories