From the course: Certified Kubernetes Security Specialist (CKS) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Install kube-bench - Kubernetes Tutorial
From the course: Certified Kubernetes Security Specialist (CKS) Cert Prep
Install kube-bench
- Let's go ahead and install Kube-bench in our Vagrant Kubernetes cluster. Now this one we're going to load in the Vagrant Kubernetes cluster because we can then get access directly to the virtual machines within it and be able to load our packages directly there. Now there are other ways to be able to install Kube-bench. You can use it as a workload, set it as a job where you actually deploy it within the cluster itself. But the quickest and easiest way is to deploy it natively on the platform, and that's more than likely what you're going to see on the CKS exam. Now the first thing we want to do is we want to take a look at the website that Aqua Security has put up for Kube-bench because it's going to have all the documentation associated with it. Now you'll notice up at the top it's saying Version 6.15, but the actual latest version is 7.3. So that's going to be something that we would want to go to that GitHub site and then be able to pull down that latest version. But the…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Module 3: Cluster hardening introduction37s
-
(Locked)
Learning objectives33s
-
(Locked)
Kubernetes API fundamentals6m 31s
-
(Locked)
Kubernetes access control10m 44s
-
(Locked)
API server configuration11m 38s
-
(Locked)
API server hardening13m 6s
-
(Locked)
Verify access control policies13m 37s
-
(Locked)
-
-
(Locked)
Module 6: Software supply chain security introduction40s
-
(Locked)
Learning objectives35s
-
(Locked)
Software supply chain risks9m 25s
-
(Locked)
Protect image registry access5m 36s
-
(Locked)
Require signed images14m 22s
-
(Locked)
Policy enforcement: Image policy webhook21m 28s
-
(Locked)
Policy enforcement: Validating admission policy8m 55s
-
(Locked)
-
-
(Locked)
Learning objectives47s
-
(Locked)
Understanding syscall behavioral analysis12m 28s
-
(Locked)
Using Falco for threat detection7m 14s
-
(Locked)
Falco host installation14m
-
(Locked)
Falco Kubernetes installation13m 51s
-
(Locked)
Falco configuration and rules7m 42s
-
(Locked)
Falco custom rules in action19m 17s
-
(Locked)
-
-
(Locked)
Module 8: Exam practice scenarios introduction42s
-
(Locked)
Learning objectives52s
-
(Locked)
Securing Kubernetes API access12m 37s
-
(Locked)
Implementing pod security standards (PSS)11m 43s
-
(Locked)
Enforcing network policies for pod communication12m 27s
-
(Locked)
Restricting image registries11m 7s
-
(Locked)
Configuring secret encryption12m 32s
-
(Locked)