Перейти до вмісту

Security Hardening

Lab Progress 0/4 completed

Цей контент ще не доступний вашою мовою.

Protecting Linux systems and containers through kernel-level security.

Security isn’t just firewalls—it’s defense in depth. This section covers the Linux security mechanisms that protect containers and hosts: kernel tuning, mandatory access controls (AppArmor, SELinux), and system call filtering (seccomp).

#ModuleDescriptionTime
4.1Kernel Hardening & sysctlNetwork stack, memory protection, kernel parameters25-30 min
4.2AppArmor ProfilesMandatory access control, profile modes, K8s integration30-35 min
4.3SELinux ContextsPolicies, contexts, enforcing mode, troubleshooting35-40 min
4.4seccomp ProfilesSystem call filtering, custom profiles25-30 min

Linux security features are directly used by Kubernetes:

  • sysctl — Node hardening, network security
  • AppArmor — Pod security profiles (Ubuntu/Debian)
  • SELinux — Pod security profiles (RHEL/CentOS)
  • seccomp — System call filtering for containers

CKS (Certified Kubernetes Security Specialist) specifically tests these topics.

After completing this section, you’ll understand:

  1. How to harden Linux kernels via sysctl
  2. How AppArmor profiles restrict application behavior
  3. How SELinux provides mandatory access control
  4. How seccomp filters dangerous system calls