Expanded

Kubernetes Security: Implementing Supply Chain Security

Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. This course will teach you the concepts for securing the Kubernetes supply chain.
Course info
Level
Intermediate
Updated
Sep 20, 2021
Duration
49m
Table of contents
Description
Course info
Level
Intermediate
Updated
Sep 20, 2021
Duration
49m
Your 10-day individual free trial includes:

Expanded library

This course and over 7,000+ additional courses from our full course library.

Hands-on library

Practice and apply knowledge faster in real-world scenarios with projects and interactive courses.
*Available on Premium only
Description

Kubernetes is an open-source system for automating deployment, scaling and management of containerized applications. In this course, Kubernetes Security: Implementing Supply Chain Security, you’ll learn to secure cloud-native applications running in Kubernetes. First, you’ll explore how to design and build secure docker images. Next, you’ll discover how to secure the image supply chain by allowlisting and using private repositories. Finally, you’ll learn how to analyze user workloads before they are deployed to the cluster and scan images for known vulnerabilities. When you’re finished with this course, you’ll have the skills and knowledge of Kubernetes and security tools needed to secure containerized applications and prepare for the Certified Kubernetes Security Specialist certification.

About the author
About the author

Antonio is a DevOps Engineer who loves to experiment with cutting-edge technologies.

Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi, everyone. My name is Antonio Piedra, and welcome to my course in Kubernetes Security: Implementing Supply Chain Security. I am a DevOps engineer specialized in development and cloud technologies. In this course, we are going to discuss how you can leverage your existing knowledge on containers to use Kubernetes in a more secure way. In this course, we are going to focus on implementing security in the supply chain. Some of the major topics that we will cover include understanding how reducing the number of token images used can help creating a more secure environment, learning best practices to have in mind while using external Docker images, including the whitelisting of external image repositories, using tools like kubesec to analyze user workload, like Pod definitions, and finally, we will demonstrate how to scan images for known vulnerabilities to mitigate any potential attacks. By the end of this course, you will be able to start implementing measures to secure your Kubernetes supply chain. Before beginning the course, you should be familiar with Kubernetes, its architecture, and how to create and deploy resources to it. Having completed and passed the Certified Kubernetes Administrator certification is highly recommended. I hope you'll join me in this journey to learn how to secure the Kubernetes supply chain with the Kubernetes Security: Implementing Supply Chain Security course, at Pluralsight.