From the course: Certified Kubernetes Security Specialist (CKS) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Limit access

Limit access

- Protecting that node and that host is really going to require that we follow some good practices with regards to being able to connect up to the various systems that are running our Kubernetes cluster. And the first thing we want to do is we want to absolutely standardize on SSH. That is by far the preferred method to be able to access our Linux host remotely, and we want to ensure that we also are disabling any other method. So just like in the example we did in an earlier lesson where we turned off Telnet, that's absolutely the correct thing to do, we don't want to have any other mechanism of being able to connect up to the system. And then of course, being able to run a default installation of SSH means that you're going to typically have it running with elevated privileges. You are also going to have some configurations that may not be optimal for protecting the system. So if left unsecured, it becomes a major issue when it comes to that particular host being compromised and…

Contents