Learn best practices and security controls for containers and the Kubernetes ecosystem using a simple five-factor security model.
Overview
Syllabus
Introduction
- Protect your containers and Kubernetes ecosystem
- What you need to know
- What are containers?
- Virtualization
- Isolation and OS security features
- Container runtime
- What is Kubernetes?
- Kubernetes master node
- Kubernetes worker node
- Overall technology architecture
- Container deployment and orchestration lifecycle
- Attack surface and vectors
- Five factors
- Secure design before code
- Secure code
- Secure container images, part 1
- Secure container images, part 2
- Image registries
- Image registry access control
- Container working environment
- Container network security
- Container port and interface security
- Host OS protection
- Securing applications in Kubernetes
- Pod Security Standard
- Access management
- Authenticating users
- Authenticating service accounts
- Authorization
- Admission control
- Security context
- Security Policy
- Kubernetes network security
- Secrets management
- Cluster security goals
- Securing API server traffic
- Securing cluster components
- Infrastructure security
- Logging and monitoring
- Next steps
Taught by
Sam Sehgal