Course Outline

Introduction

Overview of the Kubernetes API and Security Features for Government

  • Access to HTTPS endpoints, Kubernetes API, nodes, and containers
  • Kubernetes Authentication and Authorization features

How Hackers Attack Your Cluster

  • How hackers identify your etcd port, Kubernetes API, and other services
  • How hackers execute code within your container
  • How hackers escalate their privileges
  • Case study: How Tesla exposed its Kubernetes cluster to vulnerabilities

Setting up Kubernetes for Government

  • Choosing a distribution suitable for government use
  • Installing Kubernetes in alignment with public sector standards

Using Credentials and Secrets

  • The lifecycle of credentials management
  • Understanding the role of secrets in secure operations
  • Distributing credentials securely within government systems

Controlling Access to the Kubernetes API for Government

  • Encrypting API traffic using TLS protocols
  • Implementing robust authentication mechanisms for API servers
  • Implementing authorization policies for different user roles

Controlling User and Workload Capabilities for Government

  • Understanding Kubernetes policies and their application in government environments
  • Limiting resource usage to ensure efficient operations
  • Limiting container privileges to enhance security
  • Restricting network access to prevent unauthorized communication

Controlling Access to Nodes for Government

  • Separating workload access to maintain isolation and security

Protecting Cluster Components for Government

  • Restricting access to etcd to prevent data breaches
  • Disabling non-essential features to reduce attack surfaces
  • Changing, removing, and revoking credentials and tokens as needed

Securing Container Images for Government

  • Managing Docker and Kubernetes images in government contexts
  • Building secure images that comply with federal standards

Controlling Access to Cloud Resources for Government

  • Understanding cloud platform metadata and its implications for security
  • Limiting permissions to cloud resources to minimize risks

Evaluating Third Party Integrations for Government

  • Minimizing the permissions granted to third-party software in government systems
  • Evaluating components that can create pods within the government environment

Establishing a Security Policy for Government

  • Reviewing the existing security profile of government systems
  • Creating a comprehensive security model tailored to government needs
  • Considering cloud-native security practices in government operations
  • Adhering to other best practices for government IT security

Encrypting Inactive Data for Government

  • Encrypting backups to protect sensitive information
  • Encrypting the entire disk to ensure data confidentiality
  • Encrypting secret resources stored in etcd

Monitoring Activity for Government

  • Enabling audit logging to track and analyze system activities
  • Auditing and governing the software supply chain to ensure integrity
  • Subscribing to security alerts and updates to stay informed about potential threats

Summary and Conclusion

Requirements

  • Prior experience working with Kubernetes for government

Audience

  • DevOps Engineers for government
  • Developers for government
 14 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories