From the course: Certified Kubernetes Security Specialist (CKS) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Define an audit policy - Kubernetes Tutorial
From the course: Certified Kubernetes Security Specialist (CKS) Cert Prep
Define an audit policy
- Now on the previous lesson we have talked about how to configure the API server as well as some of the different characteristics you need to set in place in order to be able to turn logging on. But what does the logging file look like? Well, ultimately it's going to be written in JSON. Now there is an option to be able to set it to string values instead of JSON. That's something you can configure in hard code, but by default it's going to choose JSON. And the example over on the right is what a logging message will potentially look like. So this is going to give you all the details. You can see things like IP addresses, you can see, you know, the various groups and the specific API calls that are being added as well as any of the activities. And you know, this is actually getting both, this is a response request as well as a response that it's being sent. So you're getting a full view of what that type of a message would be. So the user information again, and any type of originating…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Module 3: Cluster hardening introduction37s
-
(Locked)
Learning objectives33s
-
(Locked)
Kubernetes API fundamentals6m 31s
-
(Locked)
Kubernetes access control10m 44s
-
(Locked)
API server configuration11m 38s
-
(Locked)
API server hardening13m 6s
-
(Locked)
Verify access control policies13m 37s
-
(Locked)
-
-
(Locked)
Module 6: Software supply chain security introduction40s
-
(Locked)
Learning objectives35s
-
(Locked)
Software supply chain risks9m 25s
-
(Locked)
Protect image registry access5m 36s
-
(Locked)
Require signed images14m 22s
-
(Locked)
Policy enforcement: Image policy webhook21m 28s
-
(Locked)
Policy enforcement: Validating admission policy8m 55s
-
(Locked)
-
-
(Locked)
Learning objectives47s
-
(Locked)
Understanding syscall behavioral analysis12m 28s
-
(Locked)
Using Falco for threat detection7m 14s
-
(Locked)
Falco host installation14m
-
(Locked)
Falco Kubernetes installation13m 51s
-
(Locked)
Falco configuration and rules7m 42s
-
(Locked)
Falco custom rules in action19m 17s
-
(Locked)
-
-
(Locked)
Module 8: Exam practice scenarios introduction42s
-
(Locked)
Learning objectives52s
-
(Locked)
Securing Kubernetes API access12m 37s
-
(Locked)
Implementing pod security standards (PSS)11m 43s
-
(Locked)
Enforcing network policies for pod communication12m 27s
-
(Locked)
Restricting image registries11m 7s
-
(Locked)
Configuring secret encryption12m 32s
-
(Locked)