Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
Cluster Setup
- Use network security policies to restrict cluster-level access
- Use the CIS benchmark to review the security configuration of Kubernetes components (etcd, kubelet, kube-dns, kube-apiserver)
- Properly configure Ingress objects with security controls
- Protect node metadata and endpoints
- Minimise the use of and access to GUI elements
- Verify platform binaries before deployment
Cluster Hardening
- Restrict access to the Kubernetes API
- Use Role-Based Access Controls (RBAC) to minimise exposure
- Exercise caution when using service accounts (e.g., disable defaults, minimise permissions on newly created accounts)
- Update Kubernetes frequently
System Hardening
- Minimise the host OS footprint (reduce attack surface)
- Minimise IAM roles
- Minimise external network access
- Appropriately utilise kernel hardening tools such as AppArmor and seccomp
Minimise Microservice Vulnerabilities
- Set up appropriate OS-level security domains (e.g., using PSP, OPA, security contexts)
- Manage Kubernetes secrets
- Use container runtime sandboxes in multi-tenant environments (e.g., gVisor, Kata Containers)
- Implement pod-to-pod encryption using mTLS
Supply Chain Security
- Minimise the base image footprint
- Secure your supply chain: whitelist allowed image registries, sign and validate images
- Use static analysis of user workloads (e.g., Kubernetes resources, Dockerfiles)
- Scan images for known vulnerabilities
Monitoring, Logging, and Runtime Security
- Perform behavioural analytics of syscall, process, and file activities at both the host and container levels to detect malicious activities
- Detect threats within physical infrastructure, applications, networks, data, users, and workloads
- Detect all phases of an attack, regardless of where it occurs or how it spreads
- Conduct deep analytical investigations and identify bad actors within the environment
- Ensure container immutability at runtime
- Use audit logs to monitor access
Summary and Conclusion
Requirements
- CKA (Certified Kubernetes Administrator) certification
Audience
- Kubernetes practitioners
21 Hours
Testimonials (3)
About the microservices and how to maintenance kubernetes
Yufri Isnaini Rochmat Maulana - Bank Indonesia
Course - Advanced Platform Engineering: Scaling with Microservices and Kubernetes
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
The knowledge and the patience from the trainer to answer to our questions.