课程目录:Kubernetes Security培训
4401 人关注
(78637/99817)
课程大纲:

   Kubernetes Security培训

 

 

Introduction

Overview of the Kubernetes API and Security Features

Access to HTTPS endpoints, Kubernetes API, nodes, and containers
Kubernetes Authentication and Authorization features
How Hackers Attack Your Cluster

How hackers find your etcd port, Kubernetes API, and other services
How hackers execute code inside your container
How hackers escalate their privileges
Case study: How Tesla exposed its Kubernetes cluster
Setting up Kubernetes

Choosing a distribution
Installing Kubernetes
Using Credentials and Secrets

The credentials life cycle
Understanding secrets
Distributing credentials
Controlling Access to the Kubernetes API

Encrypting API traffic with TLS
Implementing authentication for API servers
Implementing authorization for different roles
Controlling User and Workload Capabilities

Understanding Kubernetes policies
Limiting resource usage
Limiting container privileges
Limiting network access
Controlling access to nodes

Separating workload access
Protecting Cluster Components

Restricting access to etcd
Disabling features
Changing, removing and revoking credentials and tokens
Securing Container Image

Managing Docker and Kubernetes images
Building secure images
Controlling Access to Cloud Resources

Understanding cloud platform metadata
Limiting permissions to cloud resources
Evaluating Third Party Integrations

Minimizing the permissions granted to third party software
Evaluating components that can create pods
Establishing a Security Policy

Reviewing the existing security profile
Creating a security model
Cloud native security considerations
Other best practices
Encrypting Inactive Data

Encrypting backups
Encrypting the entire disk
Encrypting secret resources in etcd
Monitoring Activity

Enabling audit logging
Auditing and governing the software supply chain
Subscribing to security alerts and updates
Summary and Conclusion