Skip to content

CKS Curriculum

Certified Kubernetes Security Specialist - Demonstrate your ability to secure container-based applications and Kubernetes platforms

The CKS is a hands-on, performance-based exam that validates your skills in securing Kubernetes clusters and workloads. CKA certification is a prerequisite.

AspectDetails
FormatPerformance-based (hands-on)
Duration2 hours
Questions15-20 tasks
Passing Score67%
Validity2 years
PrerequisiteActive CKA certification
PartTopicWeightModules
Part 0Environment-4
Part 1Cluster Setup10%5
Part 2Cluster Hardening15%5
Part 3System Hardening15%4
Part 4Minimize Microservice Vulnerabilities20%4
Part 5Supply Chain Security20%4
Part 6Monitoring, Logging, Runtime Security20%4
Total100%30
  • 0.1 CKS Overview - Exam format and domains
  • 0.2 Security Lab - Setting up a security-focused cluster
  • 0.3 Security Tools - Essential tools (trivy, falco, kubesec)
  • 0.4 Exam Strategy - Security-focused approach
  • 1.1 Network Policies - Default deny, egress control
  • 1.2 CIS Benchmarks - Cluster hardening standards
  • 1.3 Ingress Security - TLS, authentication
  • 1.4 Node Metadata Protection - Instance metadata security
  • 1.5 GUI Element Security - Dashboard security
  • 2.1 RBAC Deep Dive - Least privilege principles
  • 2.2 Service Account Security - Token restrictions
  • 2.3 API Server Security - Admission control, audit
  • 2.4 Kubernetes Upgrades - Secure upgrade procedures
  • 2.5 Restricting API Access - Anonymous auth, insecure ports
  • 3.1 AppArmor - Application armor profiles
  • 3.2 Seccomp - System call filtering
  • 3.3 Kernel Hardening - sysctl, kernel parameters
  • 3.4 Network Security - Host firewall, port scanning

Part 4: Minimize Microservice Vulnerabilities (4 modules)

Section titled “Part 4: Minimize Microservice Vulnerabilities (4 modules)”
  • 4.1 Security Contexts - Pod and container security
  • 4.2 Pod Security Admission - Enforcing standards
  • 4.3 Secrets Management - Encryption at rest
  • 4.4 Runtime Sandboxing - gVisor, Kata containers
  • 5.1 Image Security - Base images, minimization
  • 5.2 Image Scanning - Vulnerability detection
  • 5.3 Static Analysis - YAML/manifest scanning
  • 5.4 Admission Controllers - Image policies, OPA
  • 6.1 Audit Logging - API server auditing
  • 6.2 Falco - Runtime threat detection
  • 6.3 Container Investigation - Forensics
  • 6.4 Immutable Infrastructure - Read-only containers
  1. Complete CKA first - It’s a prerequisite
  2. Set up security lab - Complete Part 0
  3. Practice with tools - Falco, Trivy, etc.
  4. Understand attack vectors - Think like an attacker
  5. Apply defense in depth - Layer your security
  • Network policies (default deny)
  • RBAC with least privilege
  • Pod Security Standards
  • Image scanning and signing
  • Runtime threat detection with Falco
  • Audit logging configuration

Begin with Part 0 to set up your security-focused environment and understand the exam format.

Good luck on your CKS journey!