Get in Touch

Course Outline

Introduction

Cluster Setup

  • Use network security policies to restrict cluster-level access
  • Use the CIS benchmark to review the security configuration of Kubernetes components (etcd, kubelet, kube-dns, kube-apiserver)
  • Properly configure Ingress objects with security controls
  • Protect node metadata and endpoints
  • Minimise the use of and access to GUI elements
  • Verify platform binaries before deployment

Cluster Hardening

  • Restrict access to the Kubernetes API
  • Use Role-Based Access Controls (RBAC) to minimise exposure
  • Exercise caution when using service accounts (e.g., disable defaults, minimise permissions on newly created accounts)
  • Update Kubernetes frequently

System Hardening

  • Minimise the host OS footprint (reduce attack surface)
  • Minimise IAM roles
  • Minimise external network access
  • Appropriately utilise kernel hardening tools such as AppArmor and seccomp

Minimise Microservice Vulnerabilities

  • Set up appropriate OS-level security domains (e.g., using PSP, OPA, security contexts)
  • Manage Kubernetes secrets
  • Use container runtime sandboxes in multi-tenant environments (e.g., gVisor, Kata Containers)
  • Implement pod-to-pod encryption using mTLS

Supply Chain Security

  • Minimise the base image footprint
  • Secure your supply chain: whitelist allowed image registries, sign and validate images
  • Use static analysis of user workloads (e.g., Kubernetes resources, Dockerfiles)
  • Scan images for known vulnerabilities

Monitoring, Logging, and Runtime Security

  • Perform behavioural analytics of syscall, process, and file activities at both the host and container levels to detect malicious activities
  • Detect threats within physical infrastructure, applications, networks, data, users, and workloads
  • Detect all phases of an attack, regardless of where it occurs or how it spreads
  • Conduct deep analytical investigations and identify bad actors within the environment
  • Ensure container immutability at runtime
  • Use audit logs to monitor access

Summary and Conclusion

Requirements

  • CKA (Certified Kubernetes Administrator) certification

Audience

  • Kubernetes practitioners
 21 Hours

Number of participants


Price per participant

Testimonials (3)

Provisional Upcoming Courses (Require 5+ participants)

Related Categories