Kurs Süresi
1.
Introduction to Kubernetes Security
-
Overview of Kubernetes and its architecture
- Common
security risks and challenges in Kubernetes environments
-
Importance of security best practices and risk management
-
Kubernetes namespaces and network policies
- Pod
security policies
-
Kubernetes image security
-
Kubernetes API authentication and access control
-
Kubernetes RBAC configuration and security settings
-
Kubernetes deployment models (e.g., Kubernetes clusters)
- Best
practices for Kubernetes networking and communication
-
Kubernetes secrets management and encryption
-
Kubernetes orchestration and management tools (e.g., kops, Helm)
- Host
operating system security
-
Kubernetes host hardening and configuration
-
Logging and monitoring for Kubernetes hosts
- Host
security best practices and risk management
-
Network security policies and segmentation
-
Kubernetes service account security
-
Kubernetes network security controls (e.g., Calico, Cilium)
-
Kubernetes container escape vulnerabilities and mitigation strategies
-
Kubernetes image signing and verification
-
Runtime security monitoring and threat detection in Kubernetes
-
Kubernetes security testing and validation
- Image
management and vulnerability scanning
-
Configuration management and automation
- Least
privilege and access control
-
Auditing and compliance
- Backup
and recovery
-
Practical exercises and labs to reinforce key Kubernetes security concepts and
best practices
-
Scenarios and use cases that simulate real-world Kubernetes security challenges
- Group discussions and collaboration on security topics and best practices