Certified Kubernetes Security Specialist (CKS) Study Guide
- Autor:
- Benjamin Muschko
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 214
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Certified Kubernetes Security Specialist (CKS) Study Guide
Vulnerabilities in software and IT infrastructure pose a major threat to organizations. In response, the Cloud Native Computing Foundation (CNCF) developed the Certified Kubernetes Security Specialist (CKS) certification to verify an administrator's proficiency to protect Kubernetes clusters and the cloud native software they contain. This practical book helps you fully prepare for the certification exam by walking you through all of the topics covered.
Different from typical multiple-choice formats used by other certifications, this performance-based exam requires deep knowledge of the tasks it covers under intense time pressure. If you want to pass the CKS exam on the first go, author Benjamin Muschko shares his personal experience to help you learn the objectives, abilities, and tips and tricks you need to pass on the first attempt.
- Identify, mitigate, and/or minimize threats to cloud native applications and Kubernetes clusters
- Learn the ins and outs of Kubernetes's security features, and external tools for security detection and mitigation purposes
- Demonstrate competency to perform the responsibilities of a Kubernetes administrator or application developer with a security viewpoint
- Solve real-world Kubernetes problems in a hands-on, command-line environment
- Effectively navigate and solve questions during the CKS exam
Wybrane bestsellery
-
The ability to administer and monitor a Kubernetes cluster is in high demand today. To meet this need, the Cloud Native Computing Foundation developed a certification exam to establish an administrator's credibility and value in the job market to confidently work in a Kubernetes environment.The C...
Certified Kubernetes Administrator (CKA) Study Guide Certified Kubernetes Administrator (CKA) Study Guide
(186.15 zł najniższa cena z 30 dni)186.15 zł
219.00 zł(-15%) -
Developers with the ability to operate, troubleshoot, and monitor applications in Kubernetes are in high demand today. To meet this need, the Cloud Native Computing Foundation created a certification exam to establish a developer's credibility and value in the job market to work in a Kubernetes e...
Certified Kubernetes Application Developer (CKAD) Study Guide Certified Kubernetes Application Developer (CKAD) Study Guide
(152.15 zł najniższa cena z 30 dni)160.65 zł
189.00 zł(-15%) -
To drugie, zaktualizowane wydanie przewodnika po systemie Prometheus. Znajdziesz w nim wyczerpujące wprowadzenie do tego oprogramowania, a także wskazówki dotyczące monitorowania aplikacji i infrastruktury, tworzenia wykresów, przekazywania ostrzeżeń, bezpośredniej instrumentacji kodu i pobierani...
Prometheus w pełnej gotowości. Jak monitorować pracę infrastruktury i wydajność działania aplikacji. Wydanie II Prometheus w pełnej gotowości. Jak monitorować pracę infrastruktury i wydajność działania aplikacji. Wydanie II
(53.40 zł najniższa cena z 30 dni)57.84 zł
89.00 zł(-35%) -
Odkryj moc Dockera i przekształć swój sposób pracy z aplikacjami i infrastrukturą! Ta książka to Twój bilet do świata, gdzie wdrożenia stają się szybsze, a aplikacje bardziej przenośne i bezpieczne. Oto, jak Docker może rewolucjonizować Twój workflow: Izolacja aplikacji: Każda aplikacja dział...
Docker w 1 dzień. Docker od podstaw, po projektowanie i praktyczne zastosowania Docker w 1 dzień. Docker od podstaw, po projektowanie i praktyczne zastosowania
-
NGINX is one of the most widely used web servers available today, in part because of itscapabilities as a load balancer and reverse proxy server for HTTP and other network protocols. This revised cookbook provides easy-to-follow examples of real-world problems in application delivery. Practical r...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Kubernetes is the de facto standard for container orchestration and distributed applications management across a microservices framework. With this practical cookbook, you'll learn hands-on Kubernetes recipes for automating the deployment, scaling, and operations of application containers across ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
In this practical guide, four Kubernetes professionals with deep experience in distributed systems, enterprise application development, and open source will guide you through the process of building applications with this container orchestration system. They distill decades of experience from com...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Get up to speed with Prometheus, the metrics-based monitoring system used in production by tens of thousands of organizations. This updated second edition provides site reliability engineers, Kubernetes administrators, and software developers with a hands-on introduction to the most important asp...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Is Kubernetes ready for stateful workloads? This open source system has become the primary platform for deploying and managing cloud native applications. But because it was originally designed for stateless workloads, working with data on Kubernetes has been challenging. If you want to avoid the ...(211.65 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł(-15%) -
Kubernetes has gained significant popularity over the past few years, with OpenShift as one of its most mature and prominent distributions. But while OpenShift provides several layers of abstraction over vanilla Kubernetes, this software can quickly become overwhelming because of its rich feature...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%)
Ebooka "Certified Kubernetes Security Specialist (CKS) Study Guide" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Certified Kubernetes Security Specialist (CKS) Study Guide" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Certified Kubernetes Security Specialist (CKS) Study Guide" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-10-981-3293-4, 9781098132934
- Data wydania ebooka:
- 2023-06-08 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 3.8MB
- Rozmiar pliku Mobi:
- 7.0MB
Spis treści ebooka
- Preface
- Who This Book Is For
- What You Will Learn
- Structure of This Book
- Conventions Used in This Book
- Using Code Examples
- OReilly Online Learning
- How to Contact Us
- Acknowledgments
- 1. Exam Details and Resources
- Kubernetes Certification Learning Path
- Kubernetes and Cloud Native Associate (KCNA)
- Kubernetes and Cloud Native Security Associate (KCSA)
- Certified Kubernetes Application Developer (CKAD)
- Certified Kubernetes Administrator (CKA)
- Certified Kubernetes Security Specialist (CKS)
- Kubernetes Certification Learning Path
- Exam Objectives
- Curriculum
- Cluster Setup
- Cluster Hardening
- System Hardening
- Minimize Microservice Vulnerabilities
- Supply Chain Security
- Monitoring, Logging, and Runtime Security
- Involved Kubernetes Primitives
- Involved External Tools
- Documentation
- Candidate Skills
- Practicing and Practice Exams
- Summary
- 2. Cluster Setup
- Using Network Policies to Restrict Pod-to-Pod Communication
- Scenario: Attacker Gains Access to a Pod
- Observing the Default Behavior
- Denying Directional Network Traffic
- Allowing Fine-Grained Incoming Traffic
- Using Network Policies to Restrict Pod-to-Pod Communication
- Applying Kubernetes Component Security Best Practices
- Using kube-bench
- The kube-bench Verification Result
- Fixing Detected Security Issues
- Creating an Ingress with TLS Termination
- Setting Up the Ingress Backend
- Creating the TLS Certificate and Key
- Creating the TLS-Typed Secret
- Creating the Ingress
- Calling the Ingress
- Protecting Node Metadata and Endpoints
- Scenario: A Compromised Pod Can Access the Metadata Server
- Protecting Metadata Server Access with Network Policies
- Protecting GUI Elements
- Scenario: An Attacker Gains Access to the Dashboard Functionality
- Installing the Kubernetes Dashboard
- Accessing the Kubernetes Dashboard
- Creating a User with Administration Privileges
- Creating a User with Restricted Privileges
- Avoiding Insecure Configuration Arguments
- Verifying Kubernetes Platform Binaries
- Scenario: An Attacker Injected Malicious Code into Binary
- Verifying a Binary Against Hash
- Summary
- Exam Essentials
- Sample Exercises
- 3. Cluster Hardening
- Interacting with the Kubernetes API
- Processing a Request
- Connecting to the API Server
- Using the kubernetes Service
- Anonymous access
- Access with a client certificate
- Interacting with the Kubernetes API
- Restricting Access to the API Server
- Scenario: An Attacker Can Call the API Server from the Internet
- Restricting User Permissions
- Creating a private key
- Creating and approving a CertificateSigningRequest
- Creating a Role and a RoleBinding
- Adding the user to the kubeconfig file
- Verifying the permissions
- Scenario: An Attacker Can Call the API Server from a Service Account
- Minimizing Permissions for a Service Account
- Binding the service account to a Pod
- Verifying the default permissions
- Creating the ClusterRole
- Creating the RoleBinding
- Verifying the granted permissions
- Disabling automounting of a service account token
- Generating a service account token
- Creating a Secret for a service account
- Updating Kubernetes Frequently
- Versioning Scheme
- Release Cadence
- Performing the Upgrade Process
- Summary
- Exam Essentials
- Sample Exercises
- 4. System Hardening
- Minimizing the Host OS Footprint
- Scenario: An Attacker Exploits a Package Vulnerability
- Disabling Services
- Removing Unwanted Packages
- Minimizing the Host OS Footprint
- Minimizing IAM Roles
- Scenario: An Attacker Uses Credentials to Gain File Access
- Understanding User Management
- Listing users
- Adding a user
- Switching to a user
- Deleting a user
- Understanding Group Management
- Listing groups
- Adding a group
- Assigning a user to a group
- Deleting a group
- Understanding File Permissions and Ownership
- Viewing file permissions and ownership
- Changing file ownership
- Changing file permissions
- Minimizing External Access to the Network
- Identifying and Disabling Open Ports
- Setting Up Firewall Rules
- Using Kernel Hardening Tools
- Using AppArmor
- Understanding profiles
- Setting a custom profile
- Applying a profile to a container
- Using AppArmor
- Using seccomp
- Applying the default container runtime profile to a container
- Setting a custom profile
- Applying the custom profile to a container
- Summary
- Exam Essentials
- Sample Exercises
- 5. Minimizing Microservice Vulnerabilities
- Setting Appropriate OS-Level Security Domains
- Scenario: An Attacker Misuses root User Container Access
- Understanding Security Contexts
- Enforcing the Usage of a Non-Root User
- Setting a Specific User and Group ID
- Avoiding Privileged Containers
- Scenario: A Developer Doesnt Follow Pod Security Best Practices
- Understanding Pod Security Admission (PSA)
- Enforcing Pod Security Standards for a Namespace
- Understanding Open Policy Agent (OPA) and Gatekeeper
- Installing Gatekeeper
- Implementing an OPA Policy
- Setting Appropriate OS-Level Security Domains
- Managing Secrets
- Scenario: An Attacker Gains Access to the Node Running etcd
- Accessing etcd Data
- Encrypting etcd Data
- Understanding Container Runtime Sandboxes
- Scenario: An Attacker Gains Access to Another Container
- Available Container Runtime Sandbox Implementations
- Installing and Configuring gVisor
- Creating and Using a Runtime Class
- Understanding Pod-to-Pod Encryption with mTLS
- Scenario: An Attacker Listens to the Communication Between Two Pods
- Adopting mTLS in Kubernetes
- Summary
- Exam Essentials
- Sample Exercises
- 6. Supply Chain Security
- Minimizing the Base Image Footprint
- Scenario: An Attacker Exploits Container Vulnerabilities
- Picking a Base Image Small in Size
- Using a Multi-Stage Approach for Building Container Images
- Reducing the Number of Layers
- Using Container Image Optimization Tools
- Minimizing the Base Image Footprint
- Securing the Supply Chain
- Signing Container Images
- Scenario: An Attacker Injects Malicious Code into a Container Image
- Validating Container Images
- Using Public Image Registries
- Scenario: An Attacker Uploads a Malicious Container Image
- Whitelisting Allowed Image Registries with OPA GateKeeper
- Whitelisting Allowed Image Registries with the ImagePolicyWebhook Admission Controller Plugin
- Implementing the Backend Application
- Configuring the ImagePolicyWebhook Admission Controller Plugin
- Static Analysis of Workload
- Using Hadolint for Analyzing Dockerfiles
- Using Kubesec for Analyzing Kubernetes Manifests
- Scanning Images for Known Vulnerabilities
- Summary
- Exam Essentials
- Sample Exercises
- 7. Monitoring, Logging, and Runtime Security
- Performing Behavior Analytics
- Scenario: A Kubernetes Administrator Can Observe Actions Taken by an Attacker
- Understanding Falco
- Installing Falco
- Configuring Falco
- Falco configuration file
- Default rules
- Custom rules
- Kubernetes-specific rules
- Applying configuration changes
- Generating Events and Inspecting Falco Logs
- Understanding Falco Rule File Basics
- Rule
- Macro
- List
- Dissecting an existing rule
- Performing Behavior Analytics
- Overriding Existing Rules
- Ensuring Container Immutability
- Scenario: An Attacker Installs Malicious Software
- Using a Distroless Container Image
- Configuring a Container with a ConfigMap or Secret
- Configuring a Read-Only Container Root Filesystem
- Using Audit Logs to Monitor Access
- Scenario: An Administrator Can Monitor Malicious Events in Real Time
- Understanding Audit Logs
- Creating the Audit Policy File
- Configuring a Log Backend
- Configuring a Webhook Backend
- Summary
- Exam Essentials
- Sample Exercises
- A. Answers to Review Questions
- Chapter 2, Cluster Setup
- Chapter 3, Cluster Hardening
- Chapter 4, System Hardening
- Chapter 5, Minimize Microservice Vulnerabilities
- Chapter 6, Supply Chain Security
- Chapter 7, Monitoring, Logging, and Runtime Security
- Index
O'Reilly Media - inne książki
-
JavaScript gives web developers great power to create rich interactive browser experiences, and much of that power is provided by the browser itself. Modern web APIs enable web-based applications to come to life like never before, supporting actions that once required browser plug-ins. Some are s...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
How will software development and operations have to change to meet the sustainability and green needs of the planet? And what does that imply for development organizations? In this eye-opening book, sustainable software advocates Anne Currie, Sarah Hsu, and Sara Bergman provide a unique overview...(160.65 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
OpenTelemetry is a revolution in observability data. Instead of running multiple uncoordinated pipelines, OpenTelemetry provides users with a single integrated stream of data, providing multiple sources of high-quality telemetry data: tracing, metrics, logs, RUM, eBPF, and more. This practical gu...(143.65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
What will you learn from this book?If you're a software developer looking for a quick on-ramp to software architecture, this handy guide is a great place to start. From the authors of Fundamentals of Software Architecture, Head First Software Architecture teaches you how to think architecturally ...(245.65 zł najniższa cena z 30 dni)
245.65 zł
289.00 zł(-15%) -
If you use Linux in your day-to-day work, then Linux Pocket Guide is the perfect on-the-job reference. This thoroughly updated 20th anniversary edition explains more than 200 Linux commands, including new commands for file handling, package management, version control, file format conversions, an...(92.65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate good development practices based on classic software design patterns and new patterns unique to embedded prog...(152.15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean product delivery in a practical and simple way. Dav...(245.65 zł najniższa cena z 30 dni)
245.65 zł
289.00 zł(-15%) -
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition off...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Decentralized finance (DeFi) is a rapidly growing field in fintech, having grown from $700 million to $100 billion over the past three years alone. But the lack of reliable information makes this area both risky and murky. In this practical book, experienced securities attorney Alexandra Damsker ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Whether you're a startup founder trying to disrupt an industry or an entrepreneur trying to provoke change from within, your biggest challenge is creating a product people actually want. Lean Analytics steers you in the right direction.This book shows you how to validate your initial idea, find t...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Certified Kubernetes Security Specialist (CKS) Study Guide Benjamin Muschko (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.