From the course: Container Security by InfoSec
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Node hardening
From the course: Container Security by InfoSec
Node hardening
- [Instructor] Welcome back to the Container Security Learning path. We're in the Kubernetes Security course, in that learning path. And this is "Section 14: Node hardening." We're going to walk you through the processes to make sure the nodes that make up your Kubernetes cluster, are hardened and secure from hopefully the evil people that won't be poking at your cluster. So, node hardening, right, if you think about it, really all of your Kubernetes cluster is, is a series of node, right nodes. That's what makes up a Kubernetes cluster. You have a bunch of nodes that know how to play nice with each other, and that plus the Kubernetes software, and you've got the Kubernetes cluster, right? So, since those nodes are a fundamental building block of the cluster, it's obviously highly important to make sure that those are properly secured so that there isn't weak points of entry into your cluster, particularly bad when you do that at a node level, since that's pretty much everything…
Contents
-
-
-
-
-
(Locked)
Introduction to kubernetes28m 56s
-
(Locked)
Kubernetes cluster, API and etcd24m 20s
-
(Locked)
Kubernetes nodes, pods, and kubelet20m 50s
-
(Locked)
Kubernetes services, labels, and namespaces25m 29s
-
(Locked)
Kubernetes and networking16m 1s
-
(Locked)
Kubernetes security design16m 41s
-
(Locked)
Kubernetes authentication and authorization17m 31s
-
(Locked)
Kubelet security and managing secrets20m 6s
-
(Locked)
Kubernetes pod, network policies, and 3rd party integrations19m 32s
-
(Locked)
Kubernetes logging and auditing19m 29s
-
(Locked)
Preventing resource exhaustion18m 37s
-
(Locked)
Helm and application deployment22m 3s
-
(Locked)
Master hardening13m 41s
-
(Locked)
Node hardening15m 50s
-
(Locked)
Pod Security and availability19m 17s
-
(Locked)
Monitoring the cluster for attacks17m 35s
-
(Locked)
Securing the cluster from the external network21m 3s
-
(Locked)
Integration with CI/CD systems17m 6s
-
(Locked)
-