Course Outline
Introduction
Overview of the Kubernetes API and Security Features for Government
- Access to HTTPS endpoints, Kubernetes API, nodes, and containers
- Kubernetes Authentication and Authorization features
How Hackers Attack Your Cluster
- How hackers identify your etcd port, Kubernetes API, and other services
- How hackers execute code within your container
- How hackers escalate their privileges
- Case study: How Tesla exposed its Kubernetes cluster to vulnerabilities
Setting up Kubernetes for Government
- Choosing a distribution suitable for government use
- Installing Kubernetes in alignment with public sector standards
Using Credentials and Secrets
- The lifecycle of credentials management
- Understanding the role of secrets in secure operations
- Distributing credentials securely within government systems
Controlling Access to the Kubernetes API for Government
- Encrypting API traffic using TLS protocols
- Implementing robust authentication mechanisms for API servers
- Implementing authorization policies for different user roles
Controlling User and Workload Capabilities for Government
- Understanding Kubernetes policies and their application in government environments
- Limiting resource usage to ensure efficient operations
- Limiting container privileges to enhance security
- Restricting network access to prevent unauthorized communication
Controlling Access to Nodes for Government
- Separating workload access to maintain isolation and security
Protecting Cluster Components for Government
- Restricting access to etcd to prevent data breaches
- Disabling non-essential features to reduce attack surfaces
- Changing, removing, and revoking credentials and tokens as needed
Securing Container Images for Government
- Managing Docker and Kubernetes images in government contexts
- Building secure images that comply with federal standards
Controlling Access to Cloud Resources for Government
- Understanding cloud platform metadata and its implications for security
- Limiting permissions to cloud resources to minimize risks
Evaluating Third Party Integrations for Government
- Minimizing the permissions granted to third-party software in government systems
- Evaluating components that can create pods within the government environment
Establishing a Security Policy for Government
- Reviewing the existing security profile of government systems
- Creating a comprehensive security model tailored to government needs
- Considering cloud-native security practices in government operations
- Adhering to other best practices for government IT security
Encrypting Inactive Data for Government
- Encrypting backups to protect sensitive information
- Encrypting the entire disk to ensure data confidentiality
- Encrypting secret resources stored in etcd
Monitoring Activity for Government
- Enabling audit logging to track and analyze system activities
- Auditing and governing the software supply chain to ensure integrity
- Subscribing to security alerts and updates to stay informed about potential threats
Summary and Conclusion
Requirements
- Prior experience working with Kubernetes for government
Audience
- DevOps Engineers for government
- Developers for government
Testimonials (5)
The HPA and VPA
Iulian Popov
Course - Kubernetes Advanced
he was patience and understood that we fall behind
Albertina - REGNOLOGY ROMANIA S.R.L.
Course - Deploying Kubernetes Applications with Helm
The training was more practical
Siphokazi Biyana - Vodacom SA
Course - Kubernetes on AWS
Learning about Kubernetes.
Felix Bautista - SGS GULF LIMITED ROHQ
Course - Kubernetes on Azure (AKS)
It gave a good grounding for Docker and Kubernetes.