Introduction to Kubernetes Security Overview

In this self-paced tutorial, you will learn the basics of Kubernetes security and the fundamental attack vectors you need to guard against. The course highlights some of the vital security features and hardening techniques developers should know before deploying applications in Kubernetes. Furthermore, this course will help you effectively communicate essential security information to operations and security teams.

By the end of this lab, you should be able to:

  • Identify flawed packages and dependencies
  • Select a hardened and updateable base image for your application
  • Recognize the fundamental Kubernetes objects needed to deploy your application safely
  • Explain the security features related to said Kubernetes objects
  • Communicate the core security requirements of your containerized application

Outline

  • Overview: Understand the background necessary to take this course effectively
  • Setup: Create a development environment to evaluate and tune a basic application
  • Understanding an Applications Attack Surface: Review all of the core Kubernetes objects, the various threats external actors can utilize, and understand what steps will mitigate the applications attack surface.
  • Harden the Application: Apply the core security concepts above to a simple application and deploy it in Kubernetes. 

Beyond KBE

KBE Community Forum
Have more questions? Join our KBE community forum sponsored by Red Hat Learning and get your questions answered real time or start a discussion with hundreds of learning community members. Engage with the KBE community and meet fellow KBE members, contributors, and subject matter experts. Join now!