Skip to main content
KodeKloud home page
Beta
Search...
⌘K
Ask AI
Sign in
Sign up
Sign up
Search...
Navigation
Cluster Setup and Hardening
Page Not Found
Home
Courses
Certified Kubernetes Security Specialist CKS
Contact Us
Community
Blog
Introduction
Course Introduction
Exam Information
Understanding the Kubernetes Attack Surface
The Attack
The 4Cs of Cloud Native security
A Quick Reminder
Cluster Setup and Hardening
Section Introduction
What are CIS Benchmarks
CIS benchmark for Kubernetes
Kube bench
Kubernetes Security Primitives
Authentication
Service Accounts
TLS Introduction
TLS Basics
TLS in Kubernetes
TLS in Kubernetes Certificate Creation
Page
Certificates API
KubeConfig
API Groups
Authorization
RBAC
Cluster Roles and Role Bindings
Kubelet Security
Kubectl Proxy Port Forward
Kubernetes Dashboard
Securing Kubernetes Dashboard
Verify platform binaries before deploying
Kubernetes Software Versions
Cluster Upgrade Process
Demo Cluster Upgrade
Network Policy
Developing Network Policies
Page
Docker Service Configuration
Docker Securing the Daemon
Securing Node Metadata in Kubernetes
Reasons to Secure Node Metadata
Protection Strategies
Auditing
System Hardening
Section Introduction
Least Privilege Principle
Minimize host OS footprint Intro
Limit Node Access
SSH Hardening
Privilege Escalation in Linux
Remove Obsolete Packages and Services
Restrict Kernel Modules
Identify and Disable Open Ports
Minimize IAM roles
Minimize external access to the network
UFW Firewall Basics
Linux Syscalls
AquaSec Tracee
Restrict syscalls using seccomp
Implement Seccomp in Kubernetes
AppArmor
Creating AppArmor Profiles
AppArmor in Kubernetes
Linux Capabilities
Minimize Microservice Vulnerabilities
Section Introduction
Security Contexts
Admission Controllers
Validating and Mutating Admission Controllers
Pod Security Policies
Pod Security Admission and Pod Security Standards
Open Policy Agent OPA
OPA in Kubernetes
Manage Kubernetes secrets
Demo Encrypting Secret Data at Rest
Page
gVisor
kata Containers
Runtime Classes
Using Runtimes in Kubernetes
One way SSL vs Mutual SSL
Implement pod to pod encryption by use of mTLS
Overview of Multi Tenancy in Kubernetes
Different types of Multi Tenancy in Kubernetes
Levels of Isolation in Kubernetes Namespace Pod Node
Control Plane Isolation
Understanding Resource Quotas
Data Plane Isolation
Data Plane Isolation Network
Data Plane Isolation Storage
Using Node Pools and TaintsTolerations for Isolation
Additional Considerations API Priority Fairness
Quality of Service
DNS in Multi Tenant Environments
Pod to Pod Encryption
Introduction to Cilium
Understanding Ciliums Architecture
Writing Effective Encryption Policies
Supply Chain Security
Section Introduction
Overview of Supply Chain Security
Risks of Inadequate Supply Chain Management
What is SBOM and Why Its Important
Minimize base image footprint
SBOM Format
SBOM Workflow
Introduction to KubeLinter
Image Security
Whitelist Allowed Registries Image Policy Webhook
Use static analysis of user workloads e
Scan images for known vulnerabilities Trivy
Monitoring Logging and Runtime Security
Section Introduction
Perform behavioral analytics of syscall process
Falco Overview and Installation
Use Falco to Detect Threats
Falco Configuration Files
Mutable vs Immutable Infrastructure
Ensure Immutability of Containers at Runtime
Use Audit Logs to monitor access
404
Page Not Found
We couldn't find the page. Maybe you were looking for one of these pages below?
Kubelet Security
Exam Information
KodeKloud Docs
⌘I