Certified Kubernetes Security Specialist

About CKS

The Certified Kubernetes Security Specialist (CKS) program provides assurance that a CKS has the skills, knowledge, and competence on a broad range of best practices for securing container-based applications and Kubernetes platforms during build, deployment and runtime. CKA certification is required to sit for this exam. Reference: CNCF-CKSarrow-up-right

Domains & Competencies

chevron-rightCluster Setup 10%hashtag
  • Use Network security policies to restrict cluster level access

  • Use CIS benchmark to review the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi)

  • Properly set up Ingress objects with security control

  • Protect node metadata and endpoints

  • Minimize use of, and access to, GUI elements

  • Verify platform binaries before deploying

chevron-rightCluster Hardening 15%hashtag
  • Restrict access to Kubernetes API

  • Use Role Based Access Controls to minimize exposure

  • Exercise caution in using service accounts e.g. disable defaults, minimize permissions on newly created ones

  • Update Kubernetes frequently

chevron-rightSystem Hardening 15%hashtag
  • Minimize host OS footprint (reduce attack surface)

  • Minimize IAM roles

  • Minimize external access to the network

  • Appropriately use kernel hardening tools such as AppArmor, seccomp

chevron-rightMinimize Microservice Vulnerabilities 20%hashtag
  • Setup appropriate OS level security domains

  • Manage Kubernetes secrets

  • Use container runtime sandboxes in multi-tenant environments (e.g. gvisor, kata containers)

  • Implement pod to pod encryption by use of mTLS

chevron-rightSupply Chain Security 20%hashtag
  • Minimize base image footprint

  • Secure your supply chain: whitelist allowed registries, sign and validate images

  • Use static analysis of user workloads (e.g. Kubernetes resources, Docker files)

  • Scan images for known vulnerabilities

chevron-rightMonitoring, Logging and Runtime Security 20%hashtag
  • Perform behavioral analytics of syscall process and file activities at the host and container level to detect malicious activities

  • Detect threats within physical infrastructure, apps, networks, data, users and workloads

  • Detect all phases of attack regardless where it occurs and how it spreads

  • Perform deep analytical investigation and identification of bad actors within environment

  • Ensure immutability of containers at runtime

  • Use Audit Logs to monitor access

Last updated