| Thema | Einzelheiten |
| Thema 1 | - Monitoring, Logging, and Runtime Security: This area of the Certified Kubernetes Security Specialist exam focuses on behavioral analytics, threat detection across infrastructure, and ensuring container immutability. The proficiency of the Kubernetes practitioner here demonstrates the ability to maintain security and investigate incidents effectively.
|
| Thema 2 | - Cluster Setup: This topic assesses the skills of Kubernetes practitioners in configuring secure Kubernetes clusters. It covers network security policies, CIS benchmarks, ingress security, node metadata protection, minimizing GUI access, and verifying platform binaries. Proficiency in these areas ensures a secure foundation for Kubernetes deployments.
|
| Thema 3 | - Cluster Hardening: Cluster hardening focuses on securing Kubernetes API access, utilizing Role-Based Access Controls, managing service accounts, and keeping Kubernetes updated. This CKS exam topic measures Kubernetes practitioners' ability to enhance cluster security by reducing exposure and managing permissions effectively.
|
| Thema 4 | - Minimize Microservice Vulnerabilities: This topic of the Linux Foundation Kubernetes Security Specialist exam evaluates techniques to secure microservices, including OS-level security domains, managing Kubernetes secrets, using container runtime sandboxes, and implementing pod-to-pod encryption. It measures the ability to safeguard against vulnerabilities within a multi-tenant environment.
|