Cloud Computing_C115: Cloud Native Security
About Course
- The Cloud-Native Security course is designed to provide participants with the essential knowledge and practical skills needed to secure cloud-native applications and infrastructure.
- As organizations increasingly adopt cloud-native architectures based on containers, microservices, and Kubernetes, ensuring the security of these environments becomes critical.
- This course covers the entire lifecycle of cloud-native security, from securing containerized applications to implementing secure practices for Kubernetes, CI/CD pipelines, identity management, and data protection.
- By the end of the course, participants will be equipped to design, implement, and monitor robust security controls in modern cloud-native environments to protect against threats and vulnerabilities.
Learning Objectives
After the completion of course student will be able to:
- Implement security controls for containerized applications, using industry-standard practices such as image scanning, vulnerability management, and runtime security monitoring to mitigate security risks in cloud-native environments.
- Configure security measures for Kubernetes clusters, including role-based access control (RBAC), network policies, and pod security policies, to ensure both the Kubernetes environment and containerized microservices are protected from unauthorized access and misconfigurations.
- Manage identity and access control (IAM) in cloud-native environments, configuring policies across cloud platforms and Kubernetes using tools like OAuth, OpenID Connect, and Kubernetes RBAC, to ensure secure access and authentication.
- Integrate security practices into the CI/CD pipeline, applying static code analysis, secret management, and security testing to embed security throughout the software development lifecycle and prevent vulnerabilities from reaching production.
- Monitor and respond to security incidents in cloud-native environments, using security monitoring tools like Prometheus, Grafana, and Falco to detect incidents and leverage metrics, logs, and alerting systems for real-time protection.
Course Content
Module-I
-
Topic 1: Container Image Security and Vulnerability Scanning
00:00 -
LO1: Define container image security and describe common vulnerabilities in container images
00:00 -
LO2: Explain the role of vulnerability scanning tools in identifying security risks in container images
00:00 -
LO3: Evaluate best practices for securing container images throughout their lifecycle
00:00 -
Topic 2: Runtime Security Monitoring for Containerized Applications
00:00 -
LO1: Describe the importance of runtime security monitoring for detecting threats in containerized applications
00:00 -
LO2: Explain various tools and techniques used for runtime monitoring of containers
00:00 -
LO3: Evaluate the effectiveness of runtime monitoring strategies in maintaining container security
00:00 -
Topic 3: Implementing Role-Based Access Control (RBAC) in Kubernetes
00:00 -
LO1: Define Role-Based Access Control (RBAC) and its significance in Kubernetes security
00:00 -
LO2: Apply RBAC policies to enforce least-privilege access in Kubernetes clusters
00:00 -
LO3: Evaluate the impact of RBAC implementation on the security posture of Kubernetes environments
00:00 -
Quiz-I
-
Topic 4: Defining and Enforcing Kubernetes Network Policies
00:00 -
LO1: Define Kubernetes network policies and describe their role in controlling pod communication
00:00 -
LO2: Apply network policies to enforce security boundaries within Kubernetes clusters
00:00 -
LO3: Evaluate the effectiveness of network policies in reducing attack surfaces and lateral movement
00:00 -
Topic 5: Using Pod Security Policies and Admission Controllers in Kubernetes
00:00 -
LO1: Describe the function of Pod Security Policies and Admission Controllers in Kubernetes security
00:00 -
LO2: Apply Pod Security Policies to restrict privileged container usage and enforce security standards
00:00 -
LO3: Evaluate how Admission Controllers ensure compliance with security policies
00:00 -
Topic 6: Identity and Access Management (IAM) in Cloud-native Environments
00:00 -
LO1: Define Identity and Access Management (IAM) and describe its importance in cloud-native environments
00:00 -
LO2: Explain principles of least privilege and role-based access within IAM
00:00 -
LO3: Evaluate IAM policies to ensure alignment with organizational security requirements
00:00 -
Quiz-II
-
Topic 7: Authentication and Authorization with OAuth2, OpenID Connect, and Kubernetes RBAC
00:00 -
LO1: Explain OAuth2 and OpenID Connect concepts and their role in authentication and authorization
00:00 -
LO2: Apply OAuth2 and OpenID Connect in conjunction with Kubernetes RBAC for access management
00:00 -
LO3: Evaluate security implications and benefits of combining OAuth2, OpenID Connect, and RBAC
00:00 -
Topic 8: DevSecOps: Integrating Security into CI/CD Pipelines
00:00 -
LO1: Define DevSecOps and describe its importance in embedding security practices into CI/CD pipelines
00:00 -
LO2: Apply security tools and practices at each stage of CI/CD to identify and mitigate vulnerabilities early
00:00 -
LO3: Evaluate the effectiveness of DevSecOps practices in reducing security risks
00:00 -
Topic 9: Static Code Analysis, Secret Management, and Secure Builds in CI/CD
00:00 -
LO1: Describe the role of static code analysis in identifying vulnerabilities during development
00:00 -
LO2: Apply best practices for managing secrets securely within CI/CD pipelines
00:00 -
LO3: Evaluate the importance of secure build processes in ensuring application integrity
00:00 -
Topic 10: Final Exam Review
00:00 -
LO1: Describe key security measures for Kubernetes and containerized applications, including IAM, RBAC, and network policies
00:00 -
LO2: Explain implementation of security in CI/CD pipelines, incident response strategies, and automation
00:00 -
LO3: Evaluate security practices, monitoring, and incident management to prepare for the final exam
00:00