亚洲国产婷婷六月丁香,亚洲av永久中文无码精品 ,亚洲av成人精品一区二区三区,亚洲av无码乱码在线观看富二代,亚洲av乱码一区二区三区香蕉

課程目錄:Kubernetes Security培訓
4401 人關注
(78637/99817)
課程大綱:

   Kubernetes Security培訓

 

 

Introduction

Overview of the Kubernetes API and Security Features

Access to HTTPS endpoints, Kubernetes API, nodes, and containers
Kubernetes Authentication and Authorization features
How Hackers Attack Your Cluster

How hackers find your etcd port, Kubernetes API, and other services
How hackers execute code inside your container
How hackers escalate their privileges
Case study: How Tesla exposed its Kubernetes cluster
Setting up Kubernetes

Choosing a distribution
Installing Kubernetes
Using Credentials and Secrets

The credentials life cycle
Understanding secrets
Distributing credentials
Controlling Access to the Kubernetes API

Encrypting API traffic with TLS
Implementing authentication for API servers
Implementing authorization for different roles
Controlling User and Workload Capabilities

Understanding Kubernetes policies
Limiting resource usage
Limiting container privileges
Limiting network access
Controlling access to nodes

Separating workload access
Protecting Cluster Components

Restricting access to etcd
Disabling features
Changing, removing and revoking credentials and tokens
Securing Container Image

Managing Docker and Kubernetes images
Building secure images
Controlling Access to Cloud Resources

Understanding cloud platform metadata
Limiting permissions to cloud resources
Evaluating Third Party Integrations

Minimizing the permissions granted to third party software
Evaluating components that can create pods
Establishing a Security Policy

Reviewing the existing security profile
Creating a security model
Cloud native security considerations
Other best practices
Encrypting Inactive Data

Encrypting backups
Encrypting the entire disk
Encrypting secret resources in etcd
Monitoring Activity

Enabling audit logging
Auditing and governing the software supply chain
Subscribing to security alerts and updates
Summary and Conclusion