This half-day course explores the security features of Kubernetes. Through a series of lecture and lab exercises, the security features of Kubernetes will be explored and implemented.
• Linux concepts and command line proficiency • General networking proficiency • Completion of Kubernetes: Hands-on Workshop
Anyone using a Kubernetes Cluster
By the end of the course, you should be able to meet the following objectives: • Understand the security model of Kubernetes • Understand the various Authentication mechanism in Kubernetes • Use RBAC policies to control access to clusters • Enable and view audit logging • Use Pod Security Policies to restrict what elevated privileges pods can request • Use Network Policies to restrict network access between pods in a cluster