1
00:00:00,480 --> 00:00:04,600
Hello and welcome to this section on Security in kubernetes.

2
00:00:04,620 --> 00:00:05,650
My name is Mumshad

3
00:00:05,660 --> 00:00:06,140
Mannambeth

4
00:00:06,180 --> 00:00:11,830
and we are going through the Certified Kubernetes Administrators Course. In this section of the course,

5
00:00:11,880 --> 00:00:15,960
we will start with understanding the kubernetes security primitives.

6
00:00:15,960 --> 00:00:21,600
How does someone gain access to the kubernetes cluster and how are their actions controlled etc at a high level.

7
00:00:21,600 --> 00:00:25,650
We then start with the various Authentication mechanisms available.

8
00:00:25,650 --> 00:00:30,960
We will look at the default settings in the cluster and we practice viewing configurations of an existing

9
00:00:30,960 --> 00:00:32,050
cluster.

10
00:00:32,130 --> 00:00:38,520
We discuss about TLS Certificates and how various components within the cluster are secured using TLS

11
00:00:38,520 --> 00:00:39,920
certificates.

12
00:00:39,960 --> 00:00:45,900
If you are a kubernetes administrator and you setup a cluster on your own, you are bound to face challenges

13
00:00:45,990 --> 00:00:53,400
related to certificates. Which is why we discuss these from ground up from the absolute basics.

14
00:00:53,400 --> 00:00:59,340
This is one of the sections that I spent a lot of time on. I wanted to simplify some of the core concepts

15
00:00:59,400 --> 00:01:04,830
around certificates which is why I have added a number of pre-requisite lectures for those who are new

16
00:01:04,830 --> 00:01:06,210
to this topic.

17
00:01:06,240 --> 00:01:11,160
We sent out a poll while working on this section to understand your knowledge about TLS certificates

18
00:01:11,610 --> 00:01:16,770
and most of you said, you were absolute beginners, which is why we thought it would be good to explain

19
00:01:16,770 --> 00:01:22,620
some of these well. Especially since there are so many certificates used within the cluster between various

20
00:01:22,620 --> 00:01:26,110
components and it can be quite confusing for a beginner.

21
00:01:26,250 --> 00:01:31,140
These lectures and the practice test associated with them should help bridge that gap.

22
00:01:31,140 --> 00:01:34,680
But you might have to be a bit patient with me on this.

23
00:01:34,680 --> 00:01:41,550
Our goal is to enable you to tackle any security related or certificate related issues by the end of

24
00:01:41,550 --> 00:01:42,840
this section.

25
00:01:42,840 --> 00:01:46,160
These prerequisite lectures may not be for everyone.

26
00:01:46,200 --> 00:01:49,560
So depending on your level of expertise with certificates.

27
00:01:49,560 --> 00:01:52,930
Feel free to skip some of these lectures as required.

28
00:01:53,310 --> 00:01:58,650
We then move on to authorization. Where we look at the various authorization mechanisms and we focus

29
00:01:58,740 --> 00:02:01,930
specifically on role based access controls.

30
00:02:01,950 --> 00:02:07,530
We then discussed how to secure images in your environment followed by security contacts and finally

31
00:02:07,620 --> 00:02:09,240
network policies.

32
00:02:09,240 --> 00:02:12,220
So a lot of lectures and practice tests coming up.

33
00:02:12,390 --> 00:02:14,550
Take it easy and I hope you enjoy.
