Video description
Like many complex systems Kubernetes has historically been insecure by default, and contains a number of “footguns” that make secure deployments difficult. Segregation of duty, least privilege, and a rigorous Continuous Security approach are the foundations of any secure system—however these become more difficult to achieve in distributed systems with many moving parts.
But all is not lost! With an understanding of the foundational layers and principles including micro-segmentation, zero trust, and local PKI, Kubernetes can be secured against the most ardent of attackers.
The course guides attendees through an introduction to Linux container security, and progresses to advanced Kubernetes cluster security. It emphasizes pragmatic threat modelling and risk assessment based on an understanding of the tools and primitives available.
What you’ll learn and how you can apply itBy the end of this course, you’ll understand:
- Linux and container security
- The Kubernetes attack surface
- Automated container security testing and DevSecOps workflows
- Open Source security tooling and the vendor landscape
And you’ll be able to:
- Break out of a container
- Attack and harden Kubernetes
- Security test Kubernetes clusters
- You’re an intermediate to advanced Kubernetes user who wants to strengthen their security understanding
- You want to become an SRE, DevOps, or DevSecOps engineer
Prerequisites
- Familiarity and comfort with Docker, Kubernetes, and the Linux command line
Recommended preparation:
- Make sure that you have a Linux VM or physical machine with at least 8GB of RAM and 20GB of disk space, as well as a second machine (or VM) with a Linux terminal. You are welcome to follow along within these, but you will need both Linux machines in order to fully participate in the exercises.
- Read Kubernetes: Up and Running (book), Chapter 1. Introduction
- Read Kubernetes Security (report)
- Chapter 1. Approaching Kubernetes Security
- Chapter 6. Running Containers Securely
Recommended follow-up:
- Read Kubernetes Security (report)
- Read Kubernetes: Up and Running (book)
Table of contents
- Kubernetes Security: Attacking and Defending Kubernetes Part 1
- Kubernetes Security: Attacking and Defending Kubernetes Part 2
- Kubernetes Security: Attacking and Defending Kubernetes Part 3
- Kubernetes Security: Attacking and Defending Kubernetes Part 4
- Kubernetes Security: Attacking and Defending Kubernetes Part 5
Product information
- Title: Kubernetes Security: Attacking and Defending Kubernetes
- Author(s):
- Release date: December 2021
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 0636920668770
You might also like
video
Complete Python Scripting for Automation
Get up to speed with automating repetitive tasks with Python About This Video Understand how to …
video
Hands-On Continuous Integration and Delivery with Jenkins X and Kubernetes
Build and deliver modern cloud applications-fast! About This Video A rapid way to develop applications for …
video
Ultimate Go Programming, Second Edition
16+ Hours of Video Instruction provides an intensive, comprehensive, and idiomatic view of the Go programming …
video
SSL Complete Guide 2021: HTTP to HTTPS
Configure Cloudflare, Free Let's Encrypt SSL/TLS certificate, NGINX, and Apache web servers, create CSR SSL requests …