Kubernetes Security: Minimizing Microservice Vulnerabilities
Microservices are secured via both code and infrastructure. This course will teach you how to secure microservices hosted within a Kubernetes environment.
What you'll learn
A vulnerability in microservice code can lead to the compromise of your entire Kubernetes cluster. In this course, Kubernetes Security: Minimizing Microservice Vulnerabilities, you’ll learn to minimize any microservice vulnerabilities that may exist. First, you’ll explore security policies that will secure your pods and containers. Next, you’ll discover how to store the secrets you need for microservices to function properly. Finally, you’ll learn how to use more secure container runtimes and to protect communications between microservices. When you’re finished with this course, you’ll have the skills and knowledge of Kubernetes security needed to minimize microservice vulnerabilities and protect your infrastructure from attack.
Table of contents
- Introducing the Scenario 3m
- The Threat of Misconfigured Security Policies 4m
- Using Pod Security Policies to Protect Your Cluster 5m
- Demo: Creating a Pod Security Policy 8m
- Securing Pods with SecurityContext Settings 8m
- Using OPA to Enforce Security-relevant Policies 6m
- Creating Constraints in OPA Gatekeeper 5m
- Review and Apply Security Policies 7m