Introduction
Welcome to container security
()
1. Overview of Containers
Overview of containers
()
Docker vs rkt and other container runtimes
()
Docker vs Kubernetes
()
2. Docker Security
Container image misconfigurations
()
Running dockers and persisting data
()
Dockerfile best practices
()
Namespaces and Cgroups
()
Seccomp and capabilities
()
Docker networking
()
Inside the container
()
Outside the container
()
Reproducible builds
()
Public vs internal image repositories
()
Hardening the build infrastructure
()
Iron vs VM vs cloud providers
()
Immutable containers
()
Live scanning
()
Baseline and anomaly detection
()
3. Kubernetes Security
Introduction to kubernetes
()
Kubernetes cluster, API and etcd
()
Kubernetes nodes, pods, and kubelet
()
Kubernetes services, labels, and namespaces
()
Kubernetes and networking
()
Kubernetes security design
()
Kubernetes authentication and authorization
()
Kubelet security and managing secrets
()
Kubernetes pod, network policies, and 3rd party integrations
()
Kubernetes logging and auditing
()
Preventing resource exhaustion
()
Helm and application deployment
()
Master hardening
()
Node hardening
()
Pod Security and availability
()
Monitoring the cluster for attacks
()
Securing the cluster from the external network
()
Integration with CI/CD systems
()