KCSA Notes
CtrlK
Home
  • Overview
  • COVERAGE
    • Overview of Cloud Native Security
    • Kubernetes Cluster Component Security
    • Kubernetes Security Fundamentals
    • Kubernetes Threat Model
    • Platform Security
    • Compliance and Security Frameworks
  • REVIEW
    • Practice Test
  • SUMMARY & REFERENCES
    • My Notes (Cheatsheet)
    • Other References
  • About #thecloudspark
Powered by GitBook
On this page
  • Supply Chain Security
  • Image Repository
  • Observability
  • Service Mesh
  • PKI
  • Connectivity
  • Admission Control
  1. COVERAGE

Platform Security

Supply Chain Security

References:

  • https://www.cncf.io/blog/2022/04/12/a-map-for-kubernetes-supply-chain-security/

Image Repository

References:

  • https://kubernetes.io/docs/concepts/security/security-checklist/#images

Observability

References:

  • https://kubernetes.io/docs/tasks/debug/debug-cluster/resource-usage-monitoring/

Service Mesh

References:

  • https://istio.io/latest/about/service-mesh/

  • https://linkerd.io/what-is-a-service-mesh/

PKI

References:

  • https://kubernetes.io/docs/setup/best-practices/certificates/

Connectivity

References:

  • https://kubernetes.io/docs/concepts/cluster-administration/networking/

Admission Control

References:

  • https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/

PreviousKubernetes Threat ModelNextCompliance and Security Frameworks

Last updated 1 year ago