-
Course
- Core Tech
Kubernetes Security: Minimizing Microservice Vulnerabilities
Microservices are secured via both code and infrastructure. This course will teach you how to secure microservices hosted within a Kubernetes environment.
What you'll learn
A vulnerability in microservice code can lead to the compromise of your entire Kubernetes cluster. In this course, Kubernetes Security: Minimizing Microservice Vulnerabilities, you’ll learn to minimize any microservice vulnerabilities that may exist. First, you’ll explore security policies that will secure your pods and containers. Next, you’ll discover how to store the secrets you need for microservices to function properly. Finally, you’ll learn how to use more secure container runtimes and to protect communications between microservices. When you’re finished with this course, you’ll have the skills and knowledge of Kubernetes security needed to minimize microservice vulnerabilities and protect your infrastructure from attack.
Table of contents
- Introducing the Scenario | 2m 51s
- The Threat of Misconfigured Security Policies | 4m 27s
- Using Pod Security Policies to Protect Your Cluster | 4m 48s
- Demo: Creating a Pod Security Policy | 7m 31s
- Securing Pods with SecurityContext Settings | 7m 48s
- Using OPA to Enforce Security-relevant Policies | 5m 32s
- Creating Constraints in OPA Gatekeeper | 4m 50s
- Review and Apply Security Policies | 6m 43s
About the author
Justin Boyer writes copy and content for tech companies. He started his IT career as a software developer, then moved into application security, becoming Security+ and CSSLP certified.
More Courses by Justin