SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
Kubernetes Security
Best Practices
With tips for the CKS exam
Ahmed AbouZaid, Sr. DevOps Engineer, Camunda
June 2022
1
About
2
Ahmed AbouZaid
Passionate about DevOps, Cloud/Kubernetes specialist,
Free/Open source geek, and an author.
• I believe in self CI/CD (Continuous Improvements/Development)
also that “The whole is greater than the sum of its parts”.
• DevOps transformation, automation, data, and metrics.
are my preferred areas.
• And I like to help both businesses and people to grow.
Find me at:
tech.aabouzaid.com | linkedin.com/in/aabouzaid
3
Introduction
Agenda
Shift-left and DevSecOps
General Security Concepts
The 4C’s of Cloud Native Security
Kubernetes Security Starter Kit
1
5
4
3
2
CKS Exam Overview and Tips
6
For
Everyone
For
Kubernetes
Specialists
Introduction
4
Containers
Technology for packaging an application
along with its runtime dependencies
Container Runtime
A software that is responsible for running
containers (e.g. Docker Engine, containerd, etc.)
Kubernetes
A cloud-native platform to manage
and orchestrate containers workloads
Introduction
5
Shift-left and DevSecOps
6
Shift-left and DevSecOps
Shift-left
A practice of moving quality measures and development activities as early as possible
in the software lifecycle. Which reduces time and risk of issues before the release.
7
Image source: Devopedia
DevSecOps
(Development, Security, and Operations)
An approach that extends DevOps
to integrate security as a shared
responsibility throughout the entire
software lifecycle. DevSecOps relies
on iterative methodologies like Agile.
Shift-left and DevSecOps
8
Image source: Dynatrace
General Security Concepts
9
General Security Concepts
10
Reducing Attack Surface
Least Privilege Principle
Security by Design and Secure by Default
Updating Frequently
1
2
3
4
The 4C’s of Cloud Native Security
11
The 4C's of Cloud Native Security
12
Container
The security of Dockerfile/Containerfile, container
image, and container access and isolation.
Code
The security of actual programming language code
like implementation, 3rd party dependency.
Cluster
The Kubernetes cluster-level security like
configuration, access, and internal network.
Cloud
The security of cloud infrastructure, co-located servers,
or corporate datacenter like OS and external network.
1
2
3
4 Image source: EDB
■ Cloud/Infrastructure Provider Security Best Practices
■ External Network Restriction
■ Operating System Hardening
■ Areas: Disabling root login, access control, firewall, SSH configuration, etc.
■ Tools: CIS Benchmarks
C1: Cloud
13
C2: Cluster
■ Overall Cluster Hardening
■ Areas: Authentication, authorization, etcd
■ Tools: RBAC, Kube-bench, Kube-hunt
■ Security Policies
■ Areas: Deployment specs, services access, admission controllers
■ Tools: Network Policy, Pod Security Admission, Open Policy Agent
■ Auditing
■ Tools: Built-in Audit Policy, Falco, Tracee
■ Container Runtime Sandbox
■ Tools: Kata containers, gVisor
14
■ Static Code Analysis
■ Areas: Kubernetes resources, Docker/container files
■ Tools: Kubesec, Checkov
■ Container Image Supply Chain
■ Areas: Trusted container registry, container image vulnerability
■ Tools: Trivy, Snyk, ImagePolicyWebhook
■ Container Access
■ Areas: Container user, container filesystem access, privileged container
■ Tools: Built-in SecurityContext, Seccomp, AppArmor, SElinux
C3: Container
15
C4: Code
■ Programming Language Security Best Practices
■ Static Code Analysis
■ Tools: SonarQube, Snyk
■ Penetration Testing
■ 3rd Party Dependency Security
16
Kubernetes Security Starter Kit
17
4 Kubernetes security tools that everyone should have:
■ Kube-linter
Use it to lint and unify your Kubernetes manifests to apply
best practices. (Also check Conftest for more powerful options)
■ Kubesec
Use it to analyze Kubernetes manifests either statically
in the CI or dynamically as an admission webhook.
■ Snyk
Use it to scan programming code and Docker/container image
for vulnerabilities.
■ Kube-hunter
Use it to spot and identify the weaknesses in Kubernetes
clusters. Try first the “passive mode”, and be careful with
the “active mode” (it could be dangerous).
18
CKS Exam Overview and Tips
19
Overview
■ Certified Kubernetes Security Specialist (CKS) was introduced in 2020 which is
the 3rd certificate after CKA and CKAD.
■ A valid CKA certification is required as a prerequisite.
■ The CKS certificate is valid for 2 years.
■ The exam available in a remote setup (you can make it from your home)
and it costs 300$ (but could get up to 50% discount around the year).
■ The exam has 12 months eligibility and 1-time free retake.
■ CKS is a hands-on exam that takes 2 hours, 15-20 tasks with different weights.
CKS Exam Overview and Tips
20
Tips
■ Practices a lot! It’s a hands-on exam! Especially Killer.sh exam simulator.
■ Time management is the key. 2 hours are not much for all those questions.
■ Track the questions. Use the embedded notepad or flags in the exam.
■ Familiarize yourself with official documentation. You can open 1 extra tab.
■ Get familiar with the web terminal. It has different shortcuts for copy/paste.
■ Get a bigger screen! The laptop or small screen will limit you a lot.
■ Disable "Ctrl + w" shortcut! This shortcut is used almost everywhere! And it will
close your exam tab if you hit it unintentionally.
More details at my blog: Certified Kubernetes Security Specialist exam tips
CKS Exam Overview and Tips
21
Thank You :-)
linkedin.com/in/aabouzaid
tech.aabouzaid.com
22
Questions?
Resources
23
■ Overview of Cloud Native Security - Kubernetes
■ Kubernetes Security Cheat Sheet - OWASP
■ Shift Left - Devopedia
■ Shift-Left Security: The Basics of Threat Modeling - Iterasec
■ What is DevSecOps? And what you need to do it well - Dynatrace
■ How DevSecOps brings security into the development process - Red Hat Developer

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Kubernetes Workshop
Kubernetes WorkshopKubernetes Workshop
Kubernetes Workshop
 
Kubernetes Introduction
Kubernetes IntroductionKubernetes Introduction
Kubernetes Introduction
 
Kubernetes Basics
Kubernetes BasicsKubernetes Basics
Kubernetes Basics
 
An Introduction to Kubernetes
An Introduction to KubernetesAn Introduction to Kubernetes
An Introduction to Kubernetes
 
Kubernetes
KubernetesKubernetes
Kubernetes
 
Introduction to helm
Introduction to helmIntroduction to helm
Introduction to helm
 
Kubernetes - A Comprehensive Overview
Kubernetes - A Comprehensive OverviewKubernetes - A Comprehensive Overview
Kubernetes - A Comprehensive Overview
 
Kubernetes
KubernetesKubernetes
Kubernetes
 
Deploy Application on Kubernetes
Deploy Application on KubernetesDeploy Application on Kubernetes
Deploy Application on Kubernetes
 
Introduction to Helm
Introduction to HelmIntroduction to Helm
Introduction to Helm
 
Introduction to Kubernetes Workshop
Introduction to Kubernetes WorkshopIntroduction to Kubernetes Workshop
Introduction to Kubernetes Workshop
 
Deploying your first application with Kubernetes
Deploying your first application with KubernetesDeploying your first application with Kubernetes
Deploying your first application with Kubernetes
 
Kubernetes Introduction
Kubernetes IntroductionKubernetes Introduction
Kubernetes Introduction
 
Hands-On Introduction to Kubernetes at LISA17
Hands-On Introduction to Kubernetes at LISA17Hands-On Introduction to Kubernetes at LISA17
Hands-On Introduction to Kubernetes at LISA17
 
What Is Helm
 What Is Helm What Is Helm
What Is Helm
 
Kubernetes Basics
Kubernetes BasicsKubernetes Basics
Kubernetes Basics
 
Advanced Deployment Strategies with Kubernetes and Istio
Advanced Deployment Strategies with Kubernetes and IstioAdvanced Deployment Strategies with Kubernetes and Istio
Advanced Deployment Strategies with Kubernetes and Istio
 
Gitops: the kubernetes way
Gitops: the kubernetes wayGitops: the kubernetes way
Gitops: the kubernetes way
 
쿠버네티스 ( Kubernetes ) 소개 자료
쿠버네티스 ( Kubernetes ) 소개 자료쿠버네티스 ( Kubernetes ) 소개 자료
쿠버네티스 ( Kubernetes ) 소개 자료
 
Getting Started with Kubernetes
Getting Started with Kubernetes Getting Started with Kubernetes
Getting Started with Kubernetes
 

Ähnlich wie Kubernetes Security Best Practices - With tips for the CKS exam

Kubernetes and container security
Kubernetes and container securityKubernetes and container security
Kubernetes and container security
Volodymyr Shynkar
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The Cloud
Velocidex Enterprises
 
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
PranavPatil822557
 

Ähnlich wie Kubernetes Security Best Practices - With tips for the CKS exam (20)

Kubernetes and container security
Kubernetes and container securityKubernetes and container security
Kubernetes and container security
 
Kubernetes Security
Kubernetes SecurityKubernetes Security
Kubernetes Security
 
IANS information security forum 2019 summary
IANS information security forum 2019 summaryIANS information security forum 2019 summary
IANS information security forum 2019 summary
 
DevSecCon Lightning 2021- Container defaults are a hackers best friend
DevSecCon Lightning 2021- Container defaults are a hackers best friendDevSecCon Lightning 2021- Container defaults are a hackers best friend
DevSecCon Lightning 2021- Container defaults are a hackers best friend
 
Terrascan - Cloud Native Security Tool
Terrascan - Cloud Native Security Tool Terrascan - Cloud Native Security Tool
Terrascan - Cloud Native Security Tool
 
10 tips for Cloud Native Security
10 tips for Cloud Native Security10 tips for Cloud Native Security
10 tips for Cloud Native Security
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWS
 
Here Be Dragons: Security Maps of the Container New World
Here Be Dragons: Security Maps of the Container New WorldHere Be Dragons: Security Maps of the Container New World
Here Be Dragons: Security Maps of the Container New World
 
Tampere Docker meetup - Happy 5th Birthday Docker
Tampere Docker meetup - Happy 5th Birthday DockerTampere Docker meetup - Happy 5th Birthday Docker
Tampere Docker meetup - Happy 5th Birthday Docker
 
Journey Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment MaturityJourney Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment Maturity
 
Secure App Aspirations: Why it is very difficult in the real world
Secure App Aspirations: Why it is very difficult in the real worldSecure App Aspirations: Why it is very difficult in the real world
Secure App Aspirations: Why it is very difficult in the real world
 
Kubernetes best practices.odf
Kubernetes best practices.odfKubernetes best practices.odf
Kubernetes best practices.odf
 
Container Stranger Danger - Why should devs care about container security
Container Stranger Danger - Why should devs care about container securityContainer Stranger Danger - Why should devs care about container security
Container Stranger Danger - Why should devs care about container security
 
Why Should Developers Care About Container Security?
Why Should Developers Care About Container Security?Why Should Developers Care About Container Security?
Why Should Developers Care About Container Security?
 
ATO 2022 - Why should devs care about container security.pdf
ATO 2022 - Why should devs care about container security.pdfATO 2022 - Why should devs care about container security.pdf
ATO 2022 - Why should devs care about container security.pdf
 
Docker Birthday #5 Meetup Cluj - Presentation
Docker Birthday #5 Meetup Cluj - PresentationDocker Birthday #5 Meetup Cluj - Presentation
Docker Birthday #5 Meetup Cluj - Presentation
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The Cloud
 
Python Web Conference 2022 - Why should devs care about container security.pdf
Python Web Conference 2022 - Why should devs care about container security.pdfPython Web Conference 2022 - Why should devs care about container security.pdf
Python Web Conference 2022 - Why should devs care about container security.pdf
 
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
 
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
 

Mehr von Ahmed AbouZaid

Mehr von Ahmed AbouZaid (9)

Platform Engineering: Manage your infrastructure using Kubernetes and Crossplane
Platform Engineering: Manage your infrastructure using Kubernetes and CrossplanePlatform Engineering: Manage your infrastructure using Kubernetes and Crossplane
Platform Engineering: Manage your infrastructure using Kubernetes and Crossplane
 
Docker Best Practices Workshop
Docker Best Practices WorkshopDocker Best Practices Workshop
Docker Best Practices Workshop
 
Kubernetes Requests and Limits
Kubernetes Requests and LimitsKubernetes Requests and Limits
Kubernetes Requests and Limits
 
DevOps for Engineers
DevOps for EngineersDevOps for Engineers
DevOps for Engineers
 
How contributing to Open-source made me a better DevOps
How contributing to Open-source made me a better DevOpsHow contributing to Open-source made me a better DevOps
How contributing to Open-source made me a better DevOps
 
Developing Ansible Dynamic Inventory Script - Nov 2017
Developing Ansible Dynamic Inventory Script - Nov 2017Developing Ansible Dynamic Inventory Script - Nov 2017
Developing Ansible Dynamic Inventory Script - Nov 2017
 
Introduction to InfluxDB and TICK Stack
Introduction to InfluxDB and TICK StackIntroduction to InfluxDB and TICK Stack
Introduction to InfluxDB and TICK Stack
 
Getting Started with Ansible
Getting Started with AnsibleGetting Started with Ansible
Getting Started with Ansible
 
Why Ubuntu? - Arabic
Why Ubuntu? - ArabicWhy Ubuntu? - Arabic
Why Ubuntu? - Arabic
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Kubernetes Security Best Practices - With tips for the CKS exam

  • 1. Kubernetes Security Best Practices With tips for the CKS exam Ahmed AbouZaid, Sr. DevOps Engineer, Camunda June 2022 1
  • 2. About 2 Ahmed AbouZaid Passionate about DevOps, Cloud/Kubernetes specialist, Free/Open source geek, and an author. • I believe in self CI/CD (Continuous Improvements/Development) also that “The whole is greater than the sum of its parts”. • DevOps transformation, automation, data, and metrics. are my preferred areas. • And I like to help both businesses and people to grow. Find me at: tech.aabouzaid.com | linkedin.com/in/aabouzaid
  • 3. 3 Introduction Agenda Shift-left and DevSecOps General Security Concepts The 4C’s of Cloud Native Security Kubernetes Security Starter Kit 1 5 4 3 2 CKS Exam Overview and Tips 6 For Everyone For Kubernetes Specialists
  • 5. Containers Technology for packaging an application along with its runtime dependencies Container Runtime A software that is responsible for running containers (e.g. Docker Engine, containerd, etc.) Kubernetes A cloud-native platform to manage and orchestrate containers workloads Introduction 5
  • 7. Shift-left and DevSecOps Shift-left A practice of moving quality measures and development activities as early as possible in the software lifecycle. Which reduces time and risk of issues before the release. 7 Image source: Devopedia
  • 8. DevSecOps (Development, Security, and Operations) An approach that extends DevOps to integrate security as a shared responsibility throughout the entire software lifecycle. DevSecOps relies on iterative methodologies like Agile. Shift-left and DevSecOps 8 Image source: Dynatrace
  • 10. General Security Concepts 10 Reducing Attack Surface Least Privilege Principle Security by Design and Secure by Default Updating Frequently 1 2 3 4
  • 11. The 4C’s of Cloud Native Security 11
  • 12. The 4C's of Cloud Native Security 12 Container The security of Dockerfile/Containerfile, container image, and container access and isolation. Code The security of actual programming language code like implementation, 3rd party dependency. Cluster The Kubernetes cluster-level security like configuration, access, and internal network. Cloud The security of cloud infrastructure, co-located servers, or corporate datacenter like OS and external network. 1 2 3 4 Image source: EDB
  • 13. ■ Cloud/Infrastructure Provider Security Best Practices ■ External Network Restriction ■ Operating System Hardening ■ Areas: Disabling root login, access control, firewall, SSH configuration, etc. ■ Tools: CIS Benchmarks C1: Cloud 13
  • 14. C2: Cluster ■ Overall Cluster Hardening ■ Areas: Authentication, authorization, etcd ■ Tools: RBAC, Kube-bench, Kube-hunt ■ Security Policies ■ Areas: Deployment specs, services access, admission controllers ■ Tools: Network Policy, Pod Security Admission, Open Policy Agent ■ Auditing ■ Tools: Built-in Audit Policy, Falco, Tracee ■ Container Runtime Sandbox ■ Tools: Kata containers, gVisor 14
  • 15. ■ Static Code Analysis ■ Areas: Kubernetes resources, Docker/container files ■ Tools: Kubesec, Checkov ■ Container Image Supply Chain ■ Areas: Trusted container registry, container image vulnerability ■ Tools: Trivy, Snyk, ImagePolicyWebhook ■ Container Access ■ Areas: Container user, container filesystem access, privileged container ■ Tools: Built-in SecurityContext, Seccomp, AppArmor, SElinux C3: Container 15
  • 16. C4: Code ■ Programming Language Security Best Practices ■ Static Code Analysis ■ Tools: SonarQube, Snyk ■ Penetration Testing ■ 3rd Party Dependency Security 16
  • 18. 4 Kubernetes security tools that everyone should have: ■ Kube-linter Use it to lint and unify your Kubernetes manifests to apply best practices. (Also check Conftest for more powerful options) ■ Kubesec Use it to analyze Kubernetes manifests either statically in the CI or dynamically as an admission webhook. ■ Snyk Use it to scan programming code and Docker/container image for vulnerabilities. ■ Kube-hunter Use it to spot and identify the weaknesses in Kubernetes clusters. Try first the “passive mode”, and be careful with the “active mode” (it could be dangerous). 18
  • 19. CKS Exam Overview and Tips 19
  • 20. Overview ■ Certified Kubernetes Security Specialist (CKS) was introduced in 2020 which is the 3rd certificate after CKA and CKAD. ■ A valid CKA certification is required as a prerequisite. ■ The CKS certificate is valid for 2 years. ■ The exam available in a remote setup (you can make it from your home) and it costs 300$ (but could get up to 50% discount around the year). ■ The exam has 12 months eligibility and 1-time free retake. ■ CKS is a hands-on exam that takes 2 hours, 15-20 tasks with different weights. CKS Exam Overview and Tips 20
  • 21. Tips ■ Practices a lot! It’s a hands-on exam! Especially Killer.sh exam simulator. ■ Time management is the key. 2 hours are not much for all those questions. ■ Track the questions. Use the embedded notepad or flags in the exam. ■ Familiarize yourself with official documentation. You can open 1 extra tab. ■ Get familiar with the web terminal. It has different shortcuts for copy/paste. ■ Get a bigger screen! The laptop or small screen will limit you a lot. ■ Disable "Ctrl + w" shortcut! This shortcut is used almost everywhere! And it will close your exam tab if you hit it unintentionally. More details at my blog: Certified Kubernetes Security Specialist exam tips CKS Exam Overview and Tips 21
  • 23. Resources 23 ■ Overview of Cloud Native Security - Kubernetes ■ Kubernetes Security Cheat Sheet - OWASP ■ Shift Left - Devopedia ■ Shift-Left Security: The Basics of Threat Modeling - Iterasec ■ What is DevSecOps? And what you need to do it well - Dynatrace ■ How DevSecOps brings security into the development process - Red Hat Developer