Course Outline

Introduction

Cluster Setup

  • Implement network security policies to restrict cluster-level access.
  • Utilize the CIS benchmark to review the security configuration of Kubernetes components, including etcd, kubelet, kubedns, and kubeapi.
  • Properly configure Ingress objects with robust security controls.
  • Safeguard node metadata and endpoints.
  • Minimize the use of and access to graphical user interface (GUI) elements.
  • Verify platform binaries before deployment.

Cluster Hardening

  • Restrict access to the Kubernetes API to ensure secure operations for government.
  • Implement Role-Based Access Controls (RBAC) to minimize exposure and enhance security.
  • Exercise caution when using service accounts, such as disabling default accounts and minimizing permissions on newly created ones.
  • Update Kubernetes frequently to incorporate the latest security patches and features.

System Hardening

  • Minimize the host operating system footprint to reduce the attack surface.
  • Limit Identity and Access Management (IAM) roles to only essential functions.
  • Restrict external access to the network to prevent unauthorized entry points.
  • Utilize kernel hardening tools, such as AppArmor and seccomp, for enhanced security.

Minimize Microservice Vulnerabilities

  • Set up appropriate OS-level security domains using Pod Security Policies (PSP), Open Policy Agent (OPA), and security contexts.
  • Manage Kubernetes secrets to protect sensitive information.
  • Use container runtime sandboxes in multi-tenant environments, such as gVisor and Kata Containers.
  • Implement pod-to-pod encryption using mutual TLS (mTLS) to secure inter-service communication.

Supply Chain Security

  • Minimize the base image footprint to reduce potential vulnerabilities.
  • Secure your supply chain by whitelisting allowed image registries and signing and validating images.
  • Use static analysis tools to review user workloads, such as Kubernetes resources and Dockerfiles.
  • Scan images for known vulnerabilities to ensure the integrity of the deployment pipeline.

Monitoring, Logging, and Runtime Security

  • Conduct behavioral analytics of syscall process and file activities at both the host and container levels to detect malicious activities.
  • Detect threats within physical infrastructure, applications, networks, data, users, and workloads to ensure comprehensive security for government operations.
  • Identify all phases of an attack, regardless of where it occurs and how it spreads, to mitigate risks effectively.
  • Perform deep analytical investigations and identification of bad actors within the environment.
  • Ensure immutability of containers at runtime to prevent unauthorized modifications.
  • Use Audit Logs to monitor access and track security-related activities.

Summary and Conclusion

Requirements

  • CKA (Certified Kubernetes Administrator) certification for government

Audience

  • Kubernetes professionals in the public sector
 21 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories