From the course: Kubernetes and Cloud Native Security Associate (KCSA) Cert Prep

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Attackers on the network

Attackers on the network

When it comes to attackers on the network, it comes from, well, yeah, maybe you might have guessed it, poor networking. So that's really what we've been talking about a lot throughout this training is poor networking or rather how to make the networking better. Things like proper security centric CINs. We're going to be talking about service mesh pretty soon. Network policies, whether it's for ingress or egress, and that's obvious, but it's the truth. Proper networking policies, eBPF, iptables, authentication, authorization configurations are a must here. It is the primary entry point for attackers and outside of the internal Kubernetes cluster, it's all about host networking. So the host network may be on-prem, it may be in Azure, it may be in AWS, it may be in 10 different places. Now there are a few key ways to prevent this. You want to monitor auditing. Remember we talked a lot about audit policies. You want to monitor the host network itself in the cloud or on-prem, you want to…

Contents