Course Outline
Introduction
Overview of the Kubernetes API and Security Features
- Access to HTTPS endpoints, Kubernetes API, nodes, and containers.
- Kubernetes Authentication and Authorization features.
Understanding How Hackers Attack Your Cluster
- Methods hackers use to discover your etcd port, Kubernetes API, and other services.
- Techniques for executing code inside your containers.
- Methods for escalating privileges.
- Case study: How Tesla exposed its Kubernetes cluster.
Setting up Kubernetes
- Choosing a distribution.
- Installing Kubernetes.
Using Credentials and Secrets
- The credentials lifecycle.
- Understanding secrets.
- Distributing credentials.
Controlling Access to the Kubernetes API
- Encrypting API traffic with TLS.
- Implementing authentication for API servers.
- Implementing authorization for different roles.
Controlling User and Workload Capabilities
- Understanding Kubernetes policies.
- Limiting resource usage.
- Limiting container privileges.
- Limiting network access.
Controlling access to nodes
- Separating workload access.
Protecting Cluster Components
- Restricting access to etcd.
- Disabling features.
- Changing, removing and revoking credentials and tokens.
Securing Container Image
- Managing Docker and Kubernetes images.
- Building secure images.
Controlling Access to Cloud Resources
- Understanding cloud platform metadata.
- Limiting permissions to cloud resources.
Evaluating Third Party Integrations
- Minimizing the permissions granted to third party software.
- Evaluating components that can create pods.
Establishing a Security Policy
- Reviewing the existing security profile.
- Creating a security model.
- Cloud native security considerations.
- Other best practices.
Encrypting Inactive Data
- Encrypting backups.
- Encrypting the entire disk.
- Encrypting secret resources in etcd.
Monitoring Activity
- Enabling audit logging.
- Auditing and governing the software supply chain.
- Subscribing to security alerts and updates.
Summary and Conclusion
Requirements
- Prior experience working with Kubernetes.
Target Audience
- DevOps engineers.
- Developers.
Testimonials (3)
About the microservices and how to maintenance kubernetes
Yufri Isnaini Rochmat Maulana - Bank Indonesia
Course - Advanced Platform Engineering: Scaling with Microservices and Kubernetes
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
The knowledge and the patience from the trainer to answer to our questions.