About Lesson
Overview:
Securing a Kubernetes cluster involves implementing best practices at every level, including authentication, authorization, network security, and Pod security.
Key Concepts:
-
Authentication:
-
Kubernetes supports multiple authentication methods, including client certificates, tokens, and external identity providers (OIDC).
-
-
Authorization:
-
Kubernetes uses Role-Based Access Control (RBAC) to manage user and application permissions.
-
-
Pod Security Standards:
-
Kubernetes enforces security policies to restrict Pod behavior.
-
Hands-on Activity:
-
Enable RBAC in your cluster:
kubectl get clusterrolebindings
-
Create a role with limited permissions:
apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: namespace: default name: pod-reader rules: - apiGroups: [""] resources: ["pods"] verbs: ["get", "watch", "list"]
kubectl apply -f pod-reader-role.yaml
-
Bind the role to a user:
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: read-pods namespace: default subjects: - kind: User name: jane apiGroup: rbac.authorization.k8s.io roleRef: kind: Role name: pod-reader apiGroup: rbac.authorization.k8s.io
kubectl apply -f role-binding.yaml