From the course: Certified Kubernetes Security Specialist (CKS) Cert Prep
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Controlling file access and user logging - Kubernetes Tutorial
From the course: Certified Kubernetes Security Specialist (CKS) Cert Prep
Controlling file access and user logging
- So that covers a lot of the configuration options we have on the user side. So we set up users, we set up groups, we've limited access to various things and set restrictions for certain commands. Now the next thing we want to do is to be able to reduce and enforce certain ownership of files and directories. Now we know for a fact that there are certain files and directories that could be absolutely detrimental to us when it comes to managing Kubernetes, and that's where the change mod comes into play. So the change mod command is going to allow us to be able to set the privileges for a particular file. So the admin.com very important file, we want to lock that thing down. So change mod 600 means that we are going to allow for read and write for the particular owner of that file only. So they're not going to be able to do any other things to that, but they can read the file and they can write it. So that will allow us to be able to lock that down. So the next thing we're going to…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Module 3: Cluster hardening introduction37s
-
(Locked)
Learning objectives33s
-
(Locked)
Kubernetes API fundamentals6m 31s
-
(Locked)
Kubernetes access control10m 44s
-
(Locked)
API server configuration11m 38s
-
(Locked)
API server hardening13m 6s
-
(Locked)
Verify access control policies13m 37s
-
(Locked)
-
-
(Locked)
Module 6: Software supply chain security introduction40s
-
(Locked)
Learning objectives35s
-
(Locked)
Software supply chain risks9m 25s
-
(Locked)
Protect image registry access5m 36s
-
(Locked)
Require signed images14m 22s
-
(Locked)
Policy enforcement: Image policy webhook21m 28s
-
(Locked)
Policy enforcement: Validating admission policy8m 55s
-
(Locked)
-
-
(Locked)
Learning objectives47s
-
(Locked)
Understanding syscall behavioral analysis12m 28s
-
(Locked)
Using Falco for threat detection7m 14s
-
(Locked)
Falco host installation14m
-
(Locked)
Falco Kubernetes installation13m 51s
-
(Locked)
Falco configuration and rules7m 42s
-
(Locked)
Falco custom rules in action19m 17s
-
(Locked)
-
-
(Locked)
Module 8: Exam practice scenarios introduction42s
-
(Locked)
Learning objectives52s
-
(Locked)
Securing Kubernetes API access12m 37s
-
(Locked)
Implementing pod security standards (PSS)11m 43s
-
(Locked)
Enforcing network policies for pod communication12m 27s
-
(Locked)
Restricting image registries11m 7s
-
(Locked)
Configuring secret encryption12m 32s
-
(Locked)