Kubernetes Security 101: Best Practices to Secure Your Cluster
Offered By: Linux Foundation via YouTube
Course Description
Overview
Learn essential Kubernetes security practices in this 34-minute conference talk by Magno Logan from Trend Micro. Explore the fundamentals of Kubernetes architecture and discover best practices for securing clusters, whether self-deployed or using managed services like GKE, EKS, or AKS. Dive into Control Plane security, covering API server protection, etcd safeguards, RBAC implementation, and network policy configuration. Examine worker node security, focusing on kubelet settings, audit log enablement, and pod security best practices. Understand the importance of CIS Benchmarks for Kubernetes and critical default configurations. Master RBAC implementation for effective user role and permission management. Gain hands-on experience in enabling audit logs for enhanced visibility and setting up network policies to prevent pod-to-pod communication and mitigate lateral movement attacks.
Syllabus
Kubernetes Security 101: Best Practices to Secure Your Cluster - Magno Logan, Trend Micro
Taught by
Linux Foundation
Tags
Related Courses
Maintaining Deployment Security in Microsoft AzurePluralsight Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning Securing Containers and Kubernetes Ecosystem
LinkedIn Learning Performing DevSecOps Automated Security Testing
Pluralsight