About the course
Kubernetes is a powerful tool, but its complexity can quickly lead to security misconfigurations if not managed carefully. In many organisations, dedicated platform or security teams are not always available, and the responsibility for securing Kubernetes clusters often falls to development teams. Unfortunately, even small configuration mistakes can have devastating effects on the security posture of your cluster and its workloads.
This practical, hands-on training is specifically designed to help developers who may not have deep K8s or Linux security expertise. You'll learn to effectively use existing Azure and Azure Kubernetes Service (AKS) features to keep your AKS clusters secure. Through instructor-led demonstrations, discussions, and hands-on labs, you'll gain the essential skills to protect your applications, manage identities, secure your network, and enforce compliance, ensuring your deployments are robust and resilient.
Instructor-led online and in-house face-to-face options are available - as part of a wider customised training programme, or as a standalone workshop, on-site at your offices or at one of many flexible meeting spaces in the UK and around the World.
-
- 1. Implement AKS Authentication & Authorisation: Configure and manage different authentication and authorisation modes for an AKS cluster, including Entra ID integration.
- 2. Secure Applications with Entra Workload ID: Utilise Entra Workload ID to provide secure, secret-less access for applications to Azure resources.
- 3. Configure Private AKS Clusters: Provision and manage private AKS clusters to significantly enhance network security and control access.
- 4. Secure the Image Supply Chain: Set up and manage a private Azure Container Registry (ACR) with private endpoints to ensure a secure container image supply chain.
- 5. Build Secure CI/CD Pipelines for AKS: Configure CI/CD pipelines to securely deploy applications to private AKS clusters and pull images from private registries.
- 6. Manage Application Secrets Securely: Implement the Key Vault Secrets Provider extension to securely mount and manage application secrets within AKS pods.
- 7. Enforce Security Standards with Azure Policy: Use Azure Policy to define and enforce security standards and compliance across AKS clusters.
- 8. Identify Additional AKS Security Features: Recognise and understand the purpose of other advanced security features for AKS, such as Azure Linux and Image Signing.
-
This training is ideal for:
Developers who are managing their own AKS clusters.
DevOps Engineers and SREs responsible for deploying and managing applications on AKS.
Cloud Security Engineers looking to enhance their knowledge of container security.
System Administrators who are new to AKS and want to build a secure foundation.
-
You will get the most out of this course if you have some prior experience with key Azure and Kubernetes concepts:
Basic understanding of Kubernetes concepts: Familiarity with fundamental Kubernetes primitives such as Pods, Deployments, and Services.
Familiarity with the Azure platform: Basic knowledge of Azure concepts and managing Azure resources.
-
This AKS security course is available for private / custom delivery for your team - as an in-house face-to-face workshop at your location of choice, or as online instructor-led training via MS Teams (or your own preferred platform).
Get in touch to find out how we can deliver tailored training which focuses on your project requirements and learning goals.
-
Day 1: Identity, Access & Network Security
Module 1: Authentication and Authorisation in AKS
Overview: Understanding the critical difference between authentication and authorisation in Kubernetes.
Hands-On Lab: Configuring Entra ID (formerly Azure AD) integration for an AKS cluster to manage user access.
Demo: Illustrating the risks of misconfiguring authentication/authorisation by accessing a public AKS cluster using a user's Entra ID credentials.
Discussion: Deep dive into various RBAC (Role-Based Access Control) options for granular control over cluster resources.
Module 2: Entra Workload ID for Secret-less Access
The Problem with Secrets: Why storing secrets directly in applications or configuration files poses a significant security risk.
Introduction to Entra Workload ID: How this feature provides secure, secret-less access for applications to Azure resources using federated identities.
Hands-On Lab: Configuring Entra Workload ID for a sample application deployed on AKS.
Demo: Observing an application on AKS successfully accessing an Azure resource (e.g., Azure SQL Database) using its federated identity without hardcoded credentials.
Module 3: Private AKS Clusters for Enhanced Network Security
The Anatomy of a Private Cluster: Understanding the network architecture of a private AKS cluster, including its private endpoint and control plane isolation.
Hands-On Lab: Provisioning a private AKS cluster and exploring various secure methods to access its API server.
Discussion: Analysing the trade-offs and decision criteria for choosing between a private cluster and a public cluster.
Module 4: Private Azure Container Registry (ACR)
Securing Image Repositories: The imperative of using a private container registry for a secure software supply chain.
Hands-On Lab: Setting up a private ACR and configuring a private endpoint for it to ensure secure image pulling.
Demo: Deploying an application to AKS, demonstrating the secure image pull from a privately connected ACR.
Day 2: Secret Management, Policy & Advanced Hardening
Module 5: CI/CD with Private ACR and AKS
The Challenge of Private Endpoints in CI/CD: Understanding why standard CI/CD agents often cannot reach private clusters or private registries.
Solutions for Secure Pipelines: Exploring strategies like using self-hosted agents within the Virtual Network (VNet) or Managed DevOps Pools.
Hands-On Lab: Setting up Managed DevOps Pools for Azure DevOps (or self-hosted agents on Azure VMs) to enable private connectivity.
Demo: Running an end-to-end deployment pipeline that securely pulls container images from a private ACR and deploys them to a private AKS cluster.
Module 6: Secret Management with Key Vault Secrets Provider Extension
Introduction to Key Vault Secrets Provider: A deep dive into how this AKS extension allows applications to securely access secrets stored in Azure Key Vault.
Hands-On Lab: Installing and configuring the Key Vault Secrets Provider on an AKS cluster.
Demo: Demonstrating how the extension mounts secrets from Azure Key Vault directly into an application's pod as files or environment variables.
Module 7: Azure Policy for AKS Governance
What is Azure Policy for AKS? Understanding its role in enforcing security, compliance, and governance standards at the cluster level.
Hands-On Lab: Implementing a built-in Azure Policy to block unsecure image deployments (e.g., images from untrusted registries or without specific tags).
Demo: Creating and applying a custom Azure Policy to enforce specific security requirements relevant to the organisation's needs.
Module 8: Introduction to Additional Security Features
Overview: A brief introduction to other crucial security features for further exploration and continuous hardening.
Features:
Azure Linux: Understanding the security benefits of using a hardened, optimised Linux distribution for AKS nodes.
AKS Automatic: How this feature simplifies cluster management and helps keep components up-to-date with the latest security patches.
Image Signing and Image Integrity Checks: A look into how to use content trust to ensure the integrity and authenticity of container images throughout the supply chain.
Pod Security Context: How to define privileged and unprivileged settings for a pod to enhance its security posture and restrict capabilities.
Q&A and Next Steps: Open discussion and resources for continued learning in AKS security.
-
Official Azure Kubernetes Service (AKS) Documentation: The comprehensive and up-to-date source for all AKS features and security best practices.
Azure Security Centre / Defender for Cloud: For broader cloud security posture management and threat protection.
Azure Policy Documentation: Detailed information on defining, assigning, and managing policies.
Azure Key Vault Documentation: For secure secret management.
OWASP Kubernetes Cheat Sheet: Community-driven best practices for securing Kubernetes.
Trusted by



