Skip to content

Commit

Permalink
Update README-cks.md
Browse files Browse the repository at this point in the history
1- change from bullets to numbered lists
2- add RBAC holistic resource
  • Loading branch information
walidshaari authored Aug 2, 2020
1 parent 19608cc commit 6f13805
Showing 1 changed file with 38 additions and 37 deletions.
75 changes: 38 additions & 37 deletions README-cks.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,64 +19,65 @@ These are the exam objectives you review and understand in order to pass the tes


### 10% - [Cluster Setup](https://kubernetes.io/docs/tasks/administer-cluster/securing-a-cluster/)
* [Use Network security policies to restrict cluster level access]()
* [Use CIS benchmark to review the security configuration of Kubernetes components]()
1. [Use Network security policies to restrict cluster level access]()
1. [Use CIS benchmark to review the security configuration of Kubernetes components]()
(etcd, kubelet, kubedns, kubeapi)
* [Properly set up Ingress objects with security control]()
* [Protect node metadata and endpoints]()
* [Minimize use of, and access to, GUI elements]()
* [Verify platform binaries before deploying]()
1. [Properly set up Ingress objects with security control]()
1. [Protect node metadata and endpoints]()
1. [Minimize use of, and access to, GUI elements]()
1. [Verify platform binaries before deploying]()

### 15% - Cluster Hardening
* [Restrict access to Kubernetes API]()
* [Use Role Based Access Controls to minimize exposure]()
* [Exercise caution in using service accounts e.g. disable defaults, minimize permissions on newly created ones]()
* [Update Kubernetes frequently]()
* [Minimize host OS footprint (reduce attack surface)]()
* [Minimize IAM roles]()
* [Minimize external access to the network]()
* [Appropriately use kernel hardening tools such as AppArmor, seccomp]()
1. [Restrict access to Kubernetes API]()
1. [Use Role Based Access Controls to minimize exposure]()
* [handy site collects together articles, tools and the official documentation all in one place](https://rbac.dev/)
1. [Exercise caution in using service accounts e.g. disable defaults, minimize permissions on newly created ones]()
1. [Update Kubernetes frequently]()
1. [Minimize host OS footprint (reduce attack surface)]()
1. [Minimize IAM roles]()
1. [Minimize external access to the network]()
1. [Appropriately use kernel hardening tools such as AppArmor, seccomp]()


### 15% System Hardening

* [Minimize host OS footprint (reduce attack surface)]()
* [Minimize IAM roles]()
* [Minimize external access to the network]()
* [Appropriately use kernel hardening tools such as AppArmor, seccomp]()
1. [Minimize host OS footprint (reduce attack surface)]()
1. [Minimize IAM roles]()
1. [Minimize external access to the network]()
1. [Appropriately use kernel hardening tools such as AppArmor, seccomp]()

!? where is selinux? assume exam systems are ubuntu

### 20% - Minimize Microservice Vulnerabilities

* [Setup appropriate OS level security domains e.g. using PSP, OPA, security contexts]()
* [Manage kubernetes secrets]()
* [Use container runtime sandboxes in multi-tenant environments (e.g. gvisor, kata containers)]()
* [Implement pod to pod encryption by use of mTLS]()
1. [Setup appropriate OS level security domains e.g. using PSP, OPA, security contexts]()
1. [Manage kubernetes secrets]()
1. [Use container runtime sandboxes in multi-tenant environments (e.g. gvisor, kata containers)]()
1. [Implement pod to pod encryption by use of mTLS]()

### 20% - Supply Chain Security
* [Minimize base image footprint]()
* [Secure your supply chain: whitelist allowed image registries, sign and validate images]()
* [Use static analysis of user workloads (e.g. kubernetes resources, docker files)]()
* [Scan images for known vulnerabilities]()
1. [Minimize base image footprint]()
1. [Secure your supply chain: whitelist allowed image registries, sign and validate images]()
1. [Use static analysis of user workloads (e.g. kubernetes resources, docker files)]()
1. [Scan images for known vulnerabilities]()


### 20% - Monitoring, Logging and Runtime Security

* [Perform behavioral analytics of syscall process and file activities at the host and container
1. [Perform behavioral analytics of syscall process and file activities at the host and container
level to detect malicious activities]()
* [Detect threats within physical infrastructure, apps, networks, data, users and workloads]()
* [Detect all phases of attack regardless where it occurs and how it spreads]()
* [Perform deep analytical investigation and identification of bad actors within environment]()
* [Ensure immutability of containers at runtime]()
* [Use Audit Logs to monitor access]()
1. [Detect threats within physical infrastructure, apps, networks, data, users and workloads]()
1. [Detect all phases of attack regardless where it occurs and how it spreads]()
1. [Perform deep analytical investigation and identification of bad actors within environment]()
1. [Ensure immutability of containers at runtime]()
1. [Use Audit Logs to monitor access]()


### Extra Kubernetes security resources
* [Aquasecurity Blogs](https://blog.aquasec.com/)
* [control-plane/Andrew Martin @sublimino: 11 ways not to get hacked](https://control-plane.io/posts/11-ways-not-to-get-hacked/)
* [InGuardians/Jay Beale: Kubernetes Practical attacks and defenses](https://youtu.be/LtCx3zZpOfs)
* [Google/Ian Lewis : Kubernetes security best practices](https://youtu.be/wqsUfvRyYpw)
1. [Aquasecurity Blogs](https://blog.aquasec.com/)
1. [control-plane/Andrew Martin @sublimino: 11 ways not to get hacked](https://control-plane.io/posts/11-ways-not-to-get-hacked/)
1. [InGuardians/Jay Beale: Kubernetes Practical attacks and defenses](https://youtu.be/LtCx3zZpOfs)
1. [Google/Ian Lewis : Kubernetes security best practices](https://youtu.be/wqsUfvRyYpw)

#### CVEs
* [CNCF Kubernetes Security Anatomy and the Recently Disclosed CVEs (CVE-2020-8555, CVE-2020-8552)](https://youtu.be/Dp1RCYCpyJk)
1. [CNCF Kubernetes Security Anatomy and the Recently Disclosed CVEs (CVE-2020-8555, CVE-2020-8552)](https://youtu.be/Dp1RCYCpyJk)

0 comments on commit 6f13805

Please sign in to comment.