Certified Kubernetes Security Specialist (CKS) study guide
Vulnerabilities in software and IT infrastructure pose a major threat to organizations. In response, the Cloud Native Computing Foundation (CNCF) developed the Certified Kubernetes Security Specialist (CKS) certification to verify an administrator's proficiency to protect Kubernetes clusters an...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Sebastopol, CA :
O'Reilly Media, Inc
2023.
|
Edición: | [First edition] |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009753338706719 |
Tabla de Contenidos:
- Intro
- Copyright
- Table of Contents
- Preface
- Who This Book Is For
- What You Will Learn
- Structure of This Book
- Conventions Used in This Book
- Using Code Examples
- O'Reilly Online Learning
- How to Contact Us
- Acknowledgments
- Chapter 1. Exam Details and Resources
- Kubernetes Certification Learning Path
- Kubernetes and Cloud Native Associate (KCNA)
- Kubernetes and Cloud Native Security Associate (KCSA)
- Certified Kubernetes Application Developer (CKAD)
- Certified Kubernetes Administrator (CKA)
- Certified Kubernetes Security Specialist (CKS)
- Exam Objectives
- Curriculum
- Cluster Setup
- Cluster Hardening
- System Hardening
- Minimize Microservice Vulnerabilities
- Supply Chain Security
- Monitoring, Logging, and Runtime Security
- Involved Kubernetes Primitives
- Involved External Tools
- Documentation
- Candidate Skills
- Practicing and Practice Exams
- Summary
- Chapter 2. Cluster Setup
- Using Network Policies to Restrict Pod-to-Pod Communication
- Scenario: Attacker Gains Access to a Pod
- Observing the Default Behavior
- Denying Directional Network Traffic
- Allowing Fine-Grained Incoming Traffic
- Applying Kubernetes Component Security Best Practices
- Using kube-bench
- The kube-bench Verification Result
- Fixing Detected Security Issues
- Creating an Ingress with TLS Termination
- Setting Up the Ingress Backend
- Creating the TLS Certificate and Key
- Creating the TLS-Typed Secret
- Creating the Ingress
- Calling the Ingress
- Protecting Node Metadata and Endpoints
- Scenario: A Compromised Pod Can Access the Metadata Server
- Protecting Metadata Server Access with Network Policies
- Protecting GUI Elements
- Scenario: An Attacker Gains Access to the Dashboard Functionality
- Installing the Kubernetes Dashboard
- Accessing the Kubernetes Dashboard
- Creating a User with Administration Privileges
- Creating a User with Restricted Privileges
- Avoiding Insecure Configuration Arguments
- Verifying Kubernetes Platform Binaries
- Scenario: An Attacker Injected Malicious Code into Binary
- Verifying a Binary Against Hash
- Summary
- Exam Essentials
- Sample Exercises
- Chapter 3. Cluster Hardening
- Interacting with the Kubernetes API
- Processing a Request
- Connecting to the API Server
- Restricting Access to the API Server
- Scenario: An Attacker Can Call the API Server from the Internet
- Restricting User Permissions
- Scenario: An Attacker Can Call the API Server from a Service Account
- Minimizing Permissions for a Service Account
- Updating Kubernetes Frequently
- Versioning Scheme
- Release Cadence
- Performing the Upgrade Process
- Summary
- Exam Essentials
- Sample Exercises
- Chapter 4. System Hardening
- Minimizing the Host OS Footprint
- Scenario: An Attacker Exploits a Package Vulnerability
- Disabling Services
- Removing Unwanted Packages
- Minimizing IAM Roles