There are many facets to security in Kubernetes. One small oversight can leave your cluster vulnerable to leaking sensitive data, running foreign workloads, and a host of other attacks. This lab shows you how to practice defense in depth in Kubernetes by covering a key security concept: security contexts. Examples of potential exploits from improperly configured clusters are also illustrated followed by guidance on how to prevent the attacks.
This lab is valuable to anyone working with Kubernetes, but the content has been prepared considering topics described in the Certified Kubernetes Administrator (CKA) Exam Curriculum. Completion of the lab will help you get hands-on experience, which is essential for passing the CKA exam.
Upon completion of this lab you will be able to:
You should be familiar with:
The following labs can be used to fulfill the prerequisites: Deploy a Stateless Application in a Kubernetes Cluster.
Bhupinder is a Lab Operations Specialist with experience in Cloud Support and IT admin roles. He currently holds the AWS Solutions Architect Professional, AWS Solutions Architect Associate, and HashiCorp Certified Terraform Associate certifications. He enjoys learning about business processes and optimizing communication.