Kubernetes Platform Security
As businesses move more applications to Kubernetes, developers and platform operators need to secure those applications and platforms. This course demonstrates concepts and tools your teams can use to secure Kubernetes for applications.

Instructor
Course Outline
Introduction
This lesson will review the topics covered in this course, discuss prerequisites you may want to take before this course, and introduce you to the instructor.
Network Policies and CNI
In this lesson, we will discuss tips and objects used to secure a Kubernetes cluster at setup time. We will review Network Policy, Ingress, and restricting access to cloud metadata services.
Cluster Hardening
In this lesson, we will cover the ongoing activities required to constantly secure a Kubernetes cluster. We will cover role-based access control (RBAC), Kubernetes upgrades, and how to restrict access to the Kubernetes API.
Microservices
In this lesson, we will cover topics on securing applications running in a Kubernetes cluster. We will cover Kubernetes Secrets, Pod Security Policy, and the Open Policy Agent.
Supply Chain Security
In this lesson, we will discuss securing your containerized application before it ever gets to Kubernetes. We will cover securing your application supply chain, tools you can use to scan container images for vulnerabilities, and even what NOT to include in container images.
Monitoring, Logging and Auditing
In this lesson we will cover tools available to platform operators to audit and monitor Kubernetes clusters on an ongoing basis. Who did what when? How do you know?
Key Takeaways
In this lesson we’ll review what we learned in the course, and the next steps you can take on your Kubernetes learning journey.