Get in Touch

Course Outline

Introduction

Overview of Kubernetes API and Security Features

  • Access to HTTPS endpoints, Kubernetes API, nodes, and containers
  • Kubernetes authentication and authorization mechanisms

Understanding Cluster Attack Vectors

  • How attackers discover the etcd port, Kubernetes API, and other services
  • How attackers execute code within containers
  • How attackers escalate privileges
  • Case study: Analysis of Tesla's Kubernetes cluster exposure

Kubernetes Setup

  • Selecting a distribution
  • Installing Kubernetes

Managing Credentials and Secrets

  • The lifecycle of credentials
  • Understanding secrets
  • Distributing credentials

Controlling Access to the Kubernetes API

  • Encrypting API traffic with TLS
  • Implementing authentication for API servers
  • Implementing role-based authorization

Managing User and Workload Capabilities

  • Understanding Kubernetes policies
  • Limiting resource consumption
  • Restricting container privileges
  • Limiting network access

Controlling Node Access

  • Segregating workload access

Protecting Cluster Components

  • Restricting access to etcd
  • Disabling unnecessary features
  • Modifying, removing, and revoking credentials and tokens

Securing Container Images

  • Managing Docker and Kubernetes images
  • Building secure images

Controlling Access to Cloud Resources

  • Understanding cloud platform metadata
  • Limiting permissions for cloud resources

Evaluating Third-Party Integrations

  • Minimizing permissions for third-party software
  • Evaluating components that can create pods

Establishing a Security Policy

  • Reviewing existing security profiles
  • Creating a security model
  • Considering cloud-native security factors
  • Adhering to other best practices

Encrypting Data at Rest

  • Encrypting backups
  • Encrypting the entire disk
  • Encrypting secret resources in etcd

Monitoring Activity

  • Enabling audit logging
  • Auditing and governing the software supply chain
  • Subscribing to security alerts and updates

Summary and Conclusion

Requirements

  • Prior experience working with Kubernetes

Audience

  • DevOps engineers
  • Developers
 14 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories