Booking options
£1,727
£1,727
Delivered Online or In-Person
You travel to organiser or they travel to you
Redhill
Two days
All levels
This course introduces concepts, procedures, and best
practices to harden Kubernetes based systems and
container-based applications against security threats. It
deals with the main areas of cloud-native security:
Kubernetes cluster setup, Kubernetes cluster
hardening, hardening the underlying operating system
and networks, minimizing microservices vulnerabilities,
obtaining supply chain security as well as monitoring,
logging, and runtime security.
What will you learn
Harden Kubernetes systems and clusters.
Harden containers.
Configure and use Kubernetes audit logs.
Securing Kubernetes training course details
Who will benefit:
Technical staff working with Kubernetes
Prerequisites:
Kubernetes_for_engineers_course.htm
Definitive Docker for engineers
Duration
2 days
This course does not only deal with the daily security
administration of Kubernetes-based systems but also
prepares delegates for the official Certified Kubernetes
Security Specialist (CKS) exams of the Cloud Native
Computing Foundation (CNCF).
Structure: 50% theory 50% hands on lab exercise
Module 1: User and authorization management
Users and service accounts in Kubernetes
Authenticating users
Managing authorizations with RBAC
Module 2: Supply chain security
Vulnerabilit checking for images
Image validation in Kubernetes
Reducing image footprint
Secure image registries
Module 3: Validating cluster setup and penetration
testing
Use CIS benchmark to review the security
configuration of Kubernetes components.
Modify the cluster components' configuration to
match the CIS Benchmark.
Penetration testing Kubernetes for known
vulnerabilities.
Module 4: System hardening
Use kernel hardening tools
Setup appropriate OS level security domains
Container runtime sandboxes
Limit network access
Module 5: Monitoring and logging
Configure Kubernetes audit logs
Configure Audit Policies
Monitor applications behaviour with Falco