Use static analysis of user workloads (e.g.Kubernetes resources, Docker files)
Labs – kubesec
Scan images for known vulnerabilities (Trivy)
Labs – Trivy
CHAPTER
Monitoring, Logging and Runtime Security
Section Introduction
Perform behavioral analytics of syscall process
Falco Overview and Installation
Use Falco to Detect Threats
Falco Configuration Files
Labs – Use Falco to Detect Threats
Mutable vs Immutable Infrastructure
Ensure Immutability of Containers at Runtime
Labs – Ensure Immutability of Containers at Runtime
Use Audit Logs to monitor access
Labs – Use Audit Logs to monitor access
CHAPTER
Mock Exams
Mock Exams
Learn how to secure container-based applications and Kubernetes clusters. No prior security basics required. We cover security from the absolute basics. (CKA is a pre-requisite for CKS exams).