This lab provides practice scenarios to help prepare you for the Certified Kubernetes Security Specialist (CKS) exam. You will be presented with tasks to complete, as well as server(s) and/or an existing Kubernetes cluster to complete them in. You will need to use your knowledge of Kubernetes to successfully complete the provided tasks, much like you would on the real CKS exam. Good luck!
Learning Objectives
Successfully complete this lab by achieving the following learning objectives:
- Create a PodSecurityPolicy to Prevent Privileged Containers
- Create a PodSecurityPolicy called
nopriv-psp
. - Configure
nopriv-psp
to prevent the creation of Pods with privileged containers.
Note: PodSecurityPolicy is already enabled in the cluster.
You can find a skeleton manifest for the PodSecurityPolicy on the CLI server at/home/cloud_user/nopriv-psp.yml
.- Create a PodSecurityPolicy called
- Use the PodSecurityPolicy to Secure a Namespace
- Create a ServiceAccount in the
hoth
namespace calledhoth-sa
. - Create an RBAC setup to use the PodSecurityPolicy.
- Create a ClusterRole called
use-nopriv-psp
that allows usage of the PodSecurityPolicy. - Create a ClusterRoleBinding called
hoth-sa-use-nopriv-psp
to bind the ClusterRole to the ServiceAccount.
Note: You can find skeleton manifests for these objects on the CLI Server at:
/home/cloud_user/hoth-sa.yml
/home/cloud_user/use-nopriv-psp.yml
/home/cloud_user/hoth-sa-use-nopriv-psp.yml
You can test your setup using the Pod manifest at
/home/cloud_user/luke.yml
. The Pod should fail creation since it uses a privileged container.- Create a ServiceAccount in the