Get in Touch

Course Outline

Introduction

Cluster Setup

  • Use network security policies to restrict cluster-level access
  • Use CIS benchmarks to review the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi)
  • Properly set up Ingress objects with security controls
  • Protect node metadata and endpoints
  • Minimize use of and access to GUI elements
  • Verify platform binaries before deploying

Cluster Hardening

  • Restrict access to the Kubernetes API
  • Use Role-Based Access Controls (RBAC) to minimize exposure
  • Exercise caution when using service accounts, e.g., disable defaults and minimize permissions on newly created ones
  • Update Kubernetes frequently

System Hardening

  • Minimize host OS footprint to reduce the attack surface
  • Minimize IAM roles
  • Minimize external access to the network
  • Appropriately utilize kernel hardening tools such as AppArmor and seccomp

Minimize Microservice Vulnerabilities

  • Set up appropriate OS-level security domains, e.g., using PSP, OPA, security contexts
  • Manage Kubernetes secrets
  • Use container runtime sandboxes in multi-tenant environments (e.g., gvisor, kata containers)
  • Implement pod-to-pod encryption using mTLS

Supply Chain Security

  • Minimize base image footprint
  • Secure your supply chain: whitelist allowed image registries, sign and validate images
  • Use static analysis of user workloads (e.g., Kubernetes resources, Dockerfiles)
  • Scan images for known vulnerabilities

Monitoring, Logging, and Runtime Security

  • Perform behavioral analytics of syscall processes and file activities at the host and container level to detect malicious activities
  • Detect threats within physical infrastructure, apps, networks, data, users, and workloads
  • Detect all phases of an attack, regardless of where it occurs and how it spreads
  • Perform deep analytical investigation and identification of bad actors within the environment
  • Ensure immutability of containers at runtime
  • Use Audit Logs to monitor access

Summary and Conclusion

Requirements

  • CKA (Certified Kubernetes Administrator) certification

Audience

  • Kubernetes practitioners
 21 Hours

Custom Corporate Training

Training solutions designed exclusively for businesses.

  • Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
  • Flexible Schedule: Dates and times adapted to your team's agenda.
  • Format: Online (live), In-company (at your offices), or Hybrid.
Investment

Price per private group, online live training, starting from 3900 € + VAT*

Contact us for an exact quote and to hear our latest promotions

Testimonials (3)

Provisional Upcoming Courses (Contact Us For More Information)

Related Categories