課程目錄:Kubernetes Security培訓
        4401 人關注
        (78637/99817)
        課程大綱:

           Kubernetes Security培訓

         

         

        Introduction

        Overview of the Kubernetes API and Security Features

        Access to HTTPS endpoints, Kubernetes API, nodes, and containers
        Kubernetes Authentication and Authorization features
        How Hackers Attack Your Cluster

        How hackers find your etcd port, Kubernetes API, and other services
        How hackers execute code inside your container
        How hackers escalate their privileges
        Case study: How Tesla exposed its Kubernetes cluster
        Setting up Kubernetes

        Choosing a distribution
        Installing Kubernetes
        Using Credentials and Secrets

        The credentials life cycle
        Understanding secrets
        Distributing credentials
        Controlling Access to the Kubernetes API

        Encrypting API traffic with TLS
        Implementing authentication for API servers
        Implementing authorization for different roles
        Controlling User and Workload Capabilities

        Understanding Kubernetes policies
        Limiting resource usage
        Limiting container privileges
        Limiting network access
        Controlling access to nodes

        Separating workload access
        Protecting Cluster Components

        Restricting access to etcd
        Disabling features
        Changing, removing and revoking credentials and tokens
        Securing Container Image

        Managing Docker and Kubernetes images
        Building secure images
        Controlling Access to Cloud Resources

        Understanding cloud platform metadata
        Limiting permissions to cloud resources
        Evaluating Third Party Integrations

        Minimizing the permissions granted to third party software
        Evaluating components that can create pods
        Establishing a Security Policy

        Reviewing the existing security profile
        Creating a security model
        Cloud native security considerations
        Other best practices
        Encrypting Inactive Data

        Encrypting backups
        Encrypting the entire disk
        Encrypting secret resources in etcd
        Monitoring Activity

        Enabling audit logging
        Auditing and governing the software supply chain
        Subscribing to security alerts and updates
        Summary and Conclusion