Skip to content

In this AKS-focused workshop, you will work with Microsoft Azure and Calico Cloud to learn how to design and deploy best practices to secure your Kubernetes environment, detecting and blocking container and network-based attacks.

Notifications You must be signed in to change notification settings

tigera-solutions/cc-aks-detect-block-network-attacks

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

50 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Microsoft Azure: Hands-on AKS workshop
Detect and block container and network-based attacks in AKS

Welcome

In this AKS-focused workshop, you will work with Microsoft Azure and Calico Cloud to learn how to design and deploy best practices to secure your Kubernetes environment, detecting and blocking container and network-based attacks.

Cloud-native applications require a modern approach based on the zero-trust principles of identity-based access, least privilege access, and proactively detecting threats and reducing the blast radius in case of a breach.

Calico Cloud enables fine-grained, zero-trust workload access controls between your microservices and external databases, cloud services, APIs, and other applications. It also prevents the lateral movement of threats with identity-aware segmentation that works across your workload environments, including hosts, VMs, Kubernetes components, and services.

You will come away from this workshop with an understanding of how others in your industry are securing and observing cloud-native applications in Microsoft Azure, along with best practices that you can implement in your organization.

Time Requirements

The estimated time to complete this workshop is 60-90 minutes.

Target Audience

  • Cloud Professionals
  • DevSecOps Professional
  • Site Reliability Engineers (SRE)
  • Solutions Architects
  • Anyone interested in Calico Cloud :)

Learning Objectives

  1. Review and customize security guardrails for network-based threats
  2. Configure IDS/IPS, workload-centric WAF, and DDoS protection
  3. Detect zero-day attacks based on suspicious container activity using syscalls, file access, and process information
  4. Preview and enforce security policies to quarantine infected workloads
  5. Visualize the security posture of your Kubernetes cluster

Modules

This workshop is organized in sequential modules. One module will build up on top of the previous module, so please, follow the order as proposed below.

Module 1 - Getting Started
Module 2 - Deploy an Azure AKS cluster
Module 3 - Connect the Azure AKS cluster to Calico Cloud
Module 4 - Security Guardrails for Network-based Threats
Module 5 - Configuring IDS protection and Workload-Centric WAF
Module 6 - Detect Zero-Day Attacks with Threat Defence
Module 7 - Quarantine Infected Workloads and KSPM
Module 8 - Clean up


Useful links

Follow us on social media

Note: The workshop provides examples and sample code as instructional content for you to consume. These examples will help you understand how to configure Calico Cloud and build a functional solution. Please note that these examples are not suitable for use in production environments.

About

In this AKS-focused workshop, you will work with Microsoft Azure and Calico Cloud to learn how to design and deploy best practices to secure your Kubernetes environment, detecting and blocking container and network-based attacks.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published