Lab 09: Container & Kubernetes Security
Objectives
Step 1: Container Security Architecture Layers
┌─────────────────────────────────────────────────────────┐
│ CONTAINER SECURITY LAYERS │
│ │
│ 1. BUILD TIME 2. DEPLOY TIME 3. RUNTIME │
│ ┌────────────┐ ┌─────────────┐ ┌──────────┐ │
│ │Image scan │ │Admission │ │Falco │ │
│ │Base image │ → │Controllers │ → │Runtime │ │
│ │SBOM gen │ │Pod Security │ │Detection │ │
│ │Secret scan │ │Standards │ │Network │ │
│ │Dockerfile │ │Network │ │Policies │ │
│ │lint │ │Policies │ │ │ │
│ └────────────┘ └─────────────┘ └──────────┘ │
└─────────────────────────────────────────────────────────┘Step 2: Image Security
Tool
Type
Integration
Step 3: Pod Security Standards
Level
Description
Who Should Use
Step 4: Kubernetes Security Policy Validator
Step 5: Admission Controllers
Controller
Type
Use Case
Step 6: Network Policies
Step 7: Secrets Management
Step 8: Capstone — Kubernetes Security Architecture
Summary
Layer
Control
Implementation
Last updated
