Skip to content

Security Tools Toolkit

Toolkit Track | 6 Modules | ~5 hours total

The Security Tools Toolkit covers the essential tools for securing Kubernetes clusters and workloads. From secrets management to runtime detection to supply chain integrity—these tools form the defense-in-depth security stack that production clusters require.

This toolkit applies concepts from Security Principles and DevSecOps Discipline.

Before starting this toolkit:

#ModuleComplexityTime
4.1Vault & External Secrets[COMPLEX]45-50 min
4.2OPA & Gatekeeper[COMPLEX]45-50 min
4.3Falco[COMPLEX]45-50 min
4.4Supply Chain Security[COMPLEX]45-50 min
4.5Tetragon[MEDIUM]90 min
4.6KubeArmor[MEDIUM]90 min
4.7Kyverno[MEDIUM]35-40 min
4.8SPIFFE/SPIRE[COMPLEX]50 min

After completing this toolkit, you will be able to:

  1. Manage secrets securely — Vault + ESO for centralized, audited secrets
  2. Enforce policies at admission — Gatekeeper/OPA for policy-as-code
  3. Detect runtime threats — Falco for syscall-based intrusion detection
  4. Secure the supply chain — Signing, SBOMs, vulnerability scanning
  5. Prevent attacks with Tetragon — eBPF-based kernel-level enforcement
  6. Implement least privilege with KubeArmor — Allow-listing for containers
WHICH SECURITY TOOL?
─────────────────────────────────────────────────────────────────
"I need to manage secrets across multiple apps"
└──▶ Vault + External Secrets Operator
• Centralized secrets
• Automatic rotation
• Audit trail
"I need to enforce security policies at deploy time"
└──▶ OPA/Gatekeeper (or Kyverno)
• Block privileged containers
• Require resource limits
• Enforce image policies
"I need to detect attacks on running containers"
└──▶ Falco
• Syscall monitoring
• Container escape detection
• Cryptominer detection
"I need to secure my container images"
└──▶ Sigstore + Trivy + Harbor
• Image signing
• Vulnerability scanning
• SBOM generation
SECURITY LAYERS:
─────────────────────────────────────────────────────────────────
Build Deploy Runtime
─────────────────────────────────────────────────────────────────
Secrets Vault ESO Vault Agent
Policy n/a Gatekeeper n/a
Scanning Trivy Admission Falco
Signing Cosign Verify n/a
┌─────────────────────────────────────────────────────────────────┐
│ KUBERNETES SECURITY STACK │
├─────────────────────────────────────────────────────────────────┤
│ │
│ SUPPLY CHAIN SECURITY │
│ ┌───────────────────────────────────────────────────────────┐ │
│ │ Sigstore (Cosign) │ Trivy │ Harbor │ SBOM │ │
│ │ Image signing Vuln scan Registry Bill of matls │ │
│ └───────────────────────────────────────────────────────────┘ │
│ │ │
│ ▼ │
│ ADMISSION CONTROL │
│ ┌───────────────────────────────────────────────────────────┐ │
│ │ OPA/Gatekeeper │ Kyverno │ Image Policy Webhook │ │
│ │ Policy-as-code Alt policy Signature verification │ │
│ └───────────────────────────────────────────────────────────┘ │
│ │ │
│ ▼ │
│ SECRETS MANAGEMENT │
│ ┌───────────────────────────────────────────────────────────┐ │
│ │ Vault │ External Secrets Operator │ Sealed Secrets │ │
│ │ Source K8s sync GitOps secrets │ │
│ └───────────────────────────────────────────────────────────┘ │
│ │ │
│ ▼ │
│ RUNTIME SECURITY │
│ ┌───────────────────────────────────────────────────────────┐ │
│ │ Falco │ NetworkPolicies │ Seccomp │ AppArmor │ │
│ │ Detection Network isolation Syscall Process restrict │ │
│ └───────────────────────────────────────────────────────────┘ │
│ │
└─────────────────────────────────────────────────────────────────┘
Module 4.1: Vault & External Secrets
│ Secrets foundation—get this right first
Module 4.2: OPA & Gatekeeper
│ Prevent bad configs from deploying
Module 4.3: Falco
│ Detect threats in running workloads
Module 4.4: Supply Chain Security
│ Secure images from build to deploy
[Toolkit Complete] → Networking Toolkit
LayerToolWhat It Prevents
BuildTrivy, CosignVulnerable images, unsigned artifacts
DeployGatekeeperMisconfigurations, policy violations
SecretsVault + ESOCredential exposure, sprawl
RuntimeFalcoActive attacks, cryptominers, shells
ZERO TRUST IN KUBERNETES
─────────────────────────────────────────────────────────────────
TRADITIONAL: "Inside the cluster = trusted"
ZERO TRUST: "Never trust, always verify"
Applied:
┌───────────────────────────────────────────────────────────────┐
│ Workload Identity │ Don't use shared service accounts │
│ Secret Access │ Audit every access, rotate regularly │
│ Network │ Default deny, explicit allow │
│ Images │ Verify signatures, scan continuously │
│ API Access │ RBAC, audit logging, admission control │
└───────────────────────────────────────────────────────────────┘
This ToolkitAlternativesWhy We Chose It
VaultAWS Secrets Manager, GCP Secret ManagerCloud-agnostic, most features
ESOSealed Secrets, SOPSMulti-provider, active development
GatekeeperKyvernoMature, OPA ecosystem, library
FalcoTetragon, SysdigCNCF graduated, largest community
CosignNotary v2Simpler, keyless support
HOW THE TOOLS WORK TOGETHER
─────────────────────────────────────────────────────────────────
1. Developer pushes code
2. CI builds image, scans with Trivy
3. CI signs with Cosign, generates SBOM
4. Push to Harbor (scans again)
5. Deploy to K8s → Gatekeeper checks:
• Is image signed?
• Does it have resource limits?
• Is it from allowed registry?
6. ESO syncs secrets from Vault
7. Pod runs → Falco monitors syscalls
8. Falcosidekick alerts on suspicious activity

Each module includes practical exercises:

ModuleKey Exercise
Vault & ESOSync secrets from Vault to Kubernetes
OPA/GatekeeperWrite policy to block privileged pods
FalcoDetect shell execution in container
Supply ChainSign image, generate SBOM, scan vulns

“Security isn’t a feature—it’s a property. These tools make security a property of your platform, not an afterthought.”