Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
Cluster Setup
- Implement network security policies to restrict cluster-level access.
- Utilize the CIS benchmark to review the security configuration of Kubernetes components, including etcd, kubelet, kubedns, and kubeapi.
- Properly configure Ingress objects with robust security controls.
- Safeguard node metadata and endpoints.
- Minimize the use of and access to graphical user interface (GUI) elements.
- Verify platform binaries before deployment.
Cluster Hardening
- Restrict access to the Kubernetes API to ensure secure operations for government.
- Implement Role-Based Access Controls (RBAC) to minimize exposure and enhance security.
- Exercise caution when using service accounts, such as disabling default accounts and minimizing permissions on newly created ones.
- Update Kubernetes frequently to incorporate the latest security patches and features.
System Hardening
- Minimize the host operating system footprint to reduce the attack surface.
- Limit Identity and Access Management (IAM) roles to only essential functions.
- Restrict external access to the network to prevent unauthorized entry points.
- Utilize kernel hardening tools, such as AppArmor and seccomp, for enhanced security.
Minimize Microservice Vulnerabilities
- Set up appropriate OS-level security domains using Pod Security Policies (PSP), Open Policy Agent (OPA), and security contexts.
- Manage Kubernetes secrets to protect sensitive information.
- Use container runtime sandboxes in multi-tenant environments, such as gVisor and Kata Containers.
- Implement pod-to-pod encryption using mutual TLS (mTLS) to secure inter-service communication.
Supply Chain Security
- Minimize the base image footprint to reduce potential vulnerabilities.
- Secure your supply chain by whitelisting allowed image registries and signing and validating images.
- Use static analysis tools to review user workloads, such as Kubernetes resources and Dockerfiles.
- Scan images for known vulnerabilities to ensure the integrity of the deployment pipeline.
Monitoring, Logging, and Runtime Security
- Conduct behavioral analytics of syscall process and file activities at both the host and container levels to detect malicious activities.
- Detect threats within physical infrastructure, applications, networks, data, users, and workloads to ensure comprehensive security for government operations.
- Identify all phases of an attack, regardless of where it occurs and how it spreads, to mitigate risks effectively.
- Perform deep analytical investigations and identification of bad actors within the environment.
- Ensure immutability of containers at runtime to prevent unauthorized modifications.
- Use Audit Logs to monitor access and track security-related activities.
Summary and Conclusion
Requirements
- CKA (Certified Kubernetes Administrator) certification for government
Audience
- Kubernetes professionals in the public sector
21 Hours
Testimonials (5)
Interactivity, no reading slides all day
Emilien Bavay - IRIS SA
Course - Kubernetes Advanced
he was patience and understood that we fall behind
Albertina - REGNOLOGY ROMANIA S.R.L.
Course - Deploying Kubernetes Applications with Helm
The training was more practical
Siphokazi Biyana - Vodacom SA
Course - Kubernetes on AWS
Learning about Kubernetes.
Felix Bautista - SGS GULF LIMITED ROHQ
Course - Kubernetes on Azure (AKS)
It gave a good grounding for Docker and Kubernetes.