KCSA Notes
search
⌘Ctrlk
Home
KCSA Notes
  • Overview
  • COVERAGE
    • Overview of Cloud Native Security
    • Kubernetes Cluster Component Security
    • Kubernetes Security Fundamentals
    • Kubernetes Threat Model
    • Platform Security
    • Compliance and Security Frameworks
  • REVIEW
    • Practice Test
  • SUMMARY & REFERENCES
    • My Notes (Cheatsheet)
    • Other References
  • About #thecloudspark
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. COVERAGE

Platform Security

hashtag
Supply Chain Security

circle-info

References:

  • https://www.cncf.io/blog/2022/04/12/a-map-for-kubernetes-supply-chain-security/arrow-up-right

hashtag
Image Repository

circle-info

References:

  • https://kubernetes.io/docs/concepts/security/security-checklist/#imagesarrow-up-right

hashtag
Observability

circle-info

References:

  • https://kubernetes.io/docs/tasks/debug/debug-cluster/resource-usage-monitoring/arrow-up-right

hashtag
Service Mesh

circle-info

References:

  • https://istio.io/latest/about/service-mesh/arrow-up-right

  • https://linkerd.io/what-is-a-service-mesh/arrow-up-right

hashtag
PKI

circle-info

References:

  • https://kubernetes.io/docs/setup/best-practices/certificates/arrow-up-right

hashtag
Connectivity

circle-info

References:

  • https://kubernetes.io/docs/concepts/cluster-administration/networking/arrow-up-right

hashtag
Admission Control

circle-info

References:

  • https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/arrow-up-right

PreviousKubernetes Threat Modelchevron-leftNextCompliance and Security Frameworkschevron-right

Last updated 1 year ago

  • Supply Chain Security
  • Image Repository
  • Observability
  • Service Mesh
  • PKI
  • Connectivity
  • Admission Control