Get in Touch

Course Outline

Introduction

Cluster Setup

  • Utilize network security policies to restrict cluster-level access
  • Apply CIS benchmarks to review the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi)
  • Configure Ingress objects with appropriate security controls
  • Protect node metadata and endpoints
  • Minimize the use of and access to GUI elements
  • Verify platform binaries before deployment

Cluster Hardening

  • Restrict access to the Kubernetes API
  • Implement Role-Based Access Controls (RBAC) to minimize exposure
  • Exercise caution when using service accounts: disable defaults and minimize permissions on newly created ones
  • Keep Kubernetes updated frequently

System Hardening

  • Reduce the host OS footprint to minimize the attack surface
  • Minimize IAM roles
  • Limit external access to the network
  • Appropriately utilize kernel hardening tools such as AppArmor and seccomp

Minimize Microservice Vulnerabilities

  • Establish appropriate OS-level security domains (e.g., using PSP, OPA, security contexts)
  • Manage Kubernetes secrets effectively
  • Use container runtime sandboxes in multi-tenant environments (e.g., gvisor, kata containers)
  • Implement pod-to-pod encryption using mTLS

Supply Chain Security

  • Reduce the footprint of base images
  • Secure the supply chain: whitelist allowed image registries, and sign and validate images
  • Perform static analysis on user workloads (e.g., Kubernetes resources, Dockerfiles)
  • Scan images for known vulnerabilities

Monitoring, Logging, and Runtime Security

  • Conduct behavioral analytics of syscall processes and file activities at the host and container levels to detect malicious activities
  • Detect threats within physical infrastructure, applications, networks, data, users, and workloads
  • Identify all phases of an attack regardless of origin or propagation path
  • Perform deep analytical investigations to identify bad actors within the environment
  • Ensure the immutability of containers at runtime
  • Use Audit Logs to monitor access

Summary and Conclusion

Requirements

  • CKA (Certified Kubernetes Administrator) certification

Target Audience

  • Kubernetes practitioners
 21 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories