Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
Cluster Setup
- Utilize network security policies to restrict cluster-level access.
- Apply CIS benchmarks to review the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi).
- Properly configure Ingress objects with security controls.
- Safeguard node metadata and endpoints.
- Minimize the use of and access to GUI elements.
- Verify platform binaries prior to deployment.
Cluster Hardening
- Restrict access to the Kubernetes API.
- Implement Role-Based Access Control (RBAC) to minimize exposure.
- Exercise caution when using service accounts: for example, disable defaults and minimize permissions on newly created accounts.
- Keep Kubernetes updated frequently.
System Hardening
- Minimize the host OS footprint to reduce the attack surface.
- Reduce IAM roles to the necessary minimum.
- Minimize external network access.
- Appropriately use kernel hardening tools such as AppArmor and seccomp.
Minimizing Microservice Vulnerabilities
- Establish appropriate OS-level security domains (e.g., using PSP, OPA, security contexts).
- Manage Kubernetes secrets effectively.
- Utilize container runtime sandboxes in multi-tenant environments (e.g., gvisor, kata containers).
- Implement pod-to-pod encryption using mTLS.
Supply Chain Security
- Minimize the base image footprint.
- Secure the supply chain by whitelisting allowed image registries and signing/validating images.
- Use static analysis for user workloads (e.g., Kubernetes resources, Docker files).
- Scan images for known vulnerabilities.
Monitoring, Logging, and Runtime Security
- Conduct behavioral analytics of system calls, processes, and file activities at the host and container levels to detect malicious activities.
- Identify threats within physical infrastructure, applications, networks, data, users, and workloads.
- Detect all phases of an attack, regardless of where it occurs or how it spreads.
- Perform deep analytical investigations to identify malicious actors within the environment.
- Ensure the immutability of containers at runtime.
- Use Audit Logs to monitor access.
Summary and Conclusion
Requirements
- CKA (Certified Kubernetes Administrator) certification
Target Audience
- Kubernetes practitioners
21 Hours
Testimonials (3)
About the microservices and how to maintenance kubernetes
Yufri Isnaini Rochmat Maulana - Bank Indonesia
Course - Advanced Platform Engineering: Scaling with Microservices and Kubernetes
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
The knowledge and the patience from the trainer to answer to our questions.