Kubernetes Security – Attacking and Defending Kubernetes

In the container and Kubernetes world, it is very easy to get started. The new technologies are very user-friendly, it just runs. The principle applies: the user first, security only afterwards. In the enterprise environment, however, security is at the forefront. So securing the container and Kubernetes world is imperative.

In this hands-on workshop, we will start from an unprotected Kubernetes cluster and secure it step by step. In addition, let’s look at an example container application and harden it one by one. We will take a look at the security-related toolbox for Kubernetes cluster administrators as well as the security-critical levers for application developers.

By the end of the workshop, we want to have developed best practices for setting up Kubernetes clusters, rolling out container applications in Kubernetes, and building container images. The workshop is aimed at all container and Kubernetes enthusiasts who care about security.

Content

  • Securing the Kubernetes API server
  • Securing the container hosts
  • Securing the container network
  • Securing computer resources
  • Securing multi-client capability

Requirements

  • Basics in dealing with Linux, terminal, terminal editor and SSH
  • Basics about containers and images
  • Container Orchestration Basics with Kubernetes

Andy Wirtz is Managing IT Consultant at ATIX AG (Germany) as well as Certified Kubernetes Administrator (CKA) and Certified Kubernetes Security Specialist (CKS). He helps his customers build and configure container platforms, deploy cloud-native services, and develop microservice applications. He specializes in security for code, containers, clusters and cloud. He offers basic and in-depth training, workshops and webinars on Kubernetes, Rancher and OpenShift.

This post is also available in: German