From the course: Kubernetes and Cloud Native Security Associate (KCSA) Cert Prep
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Attackers on the network
From the course: Kubernetes and Cloud Native Security Associate (KCSA) Cert Prep
Attackers on the network
When it comes to attackers on the network, it comes from, well, yeah, maybe you might have guessed it, poor networking. So that's really what we've been talking about a lot throughout this training is poor networking or rather how to make the networking better. Things like proper security centric CINs. We're going to be talking about service mesh pretty soon. Network policies, whether it's for ingress or egress, and that's obvious, but it's the truth. Proper networking policies, eBPF, iptables, authentication, authorization configurations are a must here. It is the primary entry point for attackers and outside of the internal Kubernetes cluster, it's all about host networking. So the host network may be on-prem, it may be in Azure, it may be in AWS, it may be in 10 different places. Now there are a few key ways to prevent this. You want to monitor auditing. Remember we talked a lot about audit policies. You want to monitor the host network itself in the cloud or on-prem, you want to…