📄️ CIS Benchmark
CIS Benchmark for Kubernetes: implementing CIS security standards, cluster hardening, secure configurations with kube-bench, compliance auditing, security benchmarks and best practices for protecting Kubernetes environments.
📄️ Hashes
Implementing integrity verification with hashes: SHA256 and SHA512, Kubernetes binary validation, container image security, distroless images, attack surface reduction and security hardening.
📄️ Attack Surface
Complete guide to attack surface reduction in Kubernetes: Linux node hardening, port and service analysis, secure user management, firewall configuration, IAM access control and security practices implementation for CKS certification.