Skip to content
/ CKS Public

Certified Kubernetes Security Specialist Exam Preparation Guide

License

Notifications You must be signed in to change notification settings

Evalle/CKS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

51 Commits
 
 
 
 
 
 

Repository files navigation

Certified Kubernetes Security Specialist Exam Preparation Guide

Check Markdown links

This guide is intended to be a point of knowledge for everyone who wants to pass Certified Kubernetes Security Specialist (CKS) Exam. The main idea is to provide links to every topic in each domain. Preference will always be the official documentation but feel free to add other useful links.

Introduction (Read carefully)

A Certified Kubernetes Security Specialist is an accomplished Kubernetes practitioner (as evidenced by holding the CKA credential) who has demonstrated competence on a broad range of best practices for securing container-based applications and Kubernetes platforms during build, deployment and runtime.

Certified Kubernetes Security Specialist (CKS) candidates must have taken and passed the Certified Kubernetes Administrator (CKA) exam prior to attempting the CKS exam. The CKS may be scheduled but not taken until CKA certification has been achieved.

Exam Details

This exam is an online, proctored, performance-based test that requires solving multiple tasks from a command line running Kubernetes. Candidates have 2 hours to complete the tasks.

The exam is based on Kubernetes v1.20

Certified Kubernetes Security Specialist (CKS) candidates must have taken and passed the Certified Kubernetes Administrator (CKA) exam prior to attempting the CKS exam. The CKS may be scheduled but not taken until CKA certification has been achieved.

Table of Contents

  1. Cluster Setup
  2. Cluster Hardening
  3. System Hardening
  4. Minimize Microservice Vulerabilities
  5. Supply Chain Security
  6. Monitoring, Logging and Runtime Security
  7. Useful Links

Cluster Setup

Cluster Hardening

System Hardening

Minimize Microservice Vulnerabilities

Supply Chain Security

Monitoring Logging and Runtime Security

  • Perform behavioral analytics of syscall process and file activities at the host and container level to detect malicious activities - (strace)
  • Detect threats within physical infrastructure, apps, networks, data, users and workloads
  • Detect all phases of attack regardless where it occurs and how it spreads
  • Perform deep analytical investigation and identification of bad actors within environment
  • Ensure immutability of containers at runtime
  • Use Audit Logs to monitor access

Useful Links

Courses

Info