Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about critical Kubernetes security measures in this technical presentation that explores common attack vectors and defensive strategies. Discover the major components of Kubernetes deployments while gaining practical knowledge about securing them against various threats including supply chain risks, malicious actors, insider threats, and misconfigurations. Master essential security concepts including pod security, network separation, authentication and authorization mechanisms, audit logging implementation, and threat detection techniques. Explore detailed approaches for monitoring Kubernetes deployments, implementing proper networking policies, managing user authentication, securing compute resources, protecting the control plane, configuring audit policies, hardening worker nodes and pods, and establishing effective log aggregation practices. Gain valuable insights from Department of Defense security experts on detecting and preventing attacks that commonly exploit misconfigured networking policies, authentication systems, authorization controls, and outdated software components.
Syllabus
Introduction
Kubernetes Components
User Authentication
Networking Policies
Secure Compute
Control Plane
Audit Policy
Worker Nodes
Pods
aggregate your logs
Taught by
LF Networking