Overview
Syllabus
intro
preamble
about jacob
4 c's of cloud security
lab summary - layers covered
cloud: kubernetes architecture
k8s security best practices
role based access control
sample role
sample role binding
why use tools?
demo: kube-bench
container: what is virtualization?
what is a container?
degrees of isolation
parts of a container image
docker file example
container breakout
preventing container breakout
limiting linux kernal calls
kubesec
pod security admissions
network policies
sample network policy
shortcomings of built-in features
extending kubernetes: opa and gatekeeper
lab: gatekeeper
cve scanning with trivy
limiting linux kernel calls
demo: project falco
summary
questions?
Taught by
Conf42