Skip to content

In this AKS-focused workshop, you will work with Calico Cloud to learn how to strengthen your Microsoft AKS cluster security posture.

Notifications You must be signed in to change notification settings

tigera-solutions/cc-aks-strengthen-security-workshop

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

AKS and Calico blueprints hands-on workshop:
Strengthen security posture of app & K8s cluster

Welcome

In this AKS-centric workshop, participants will work closely with Calico Cloud, a comprehensive networking and security solution provided by Tigera. Throughout the workshop, we will explore a range of security features and best practices tailored for AKS deployments, learning to implement robust network security measures, enforce access controls, and fortify AKS environments against potential threats.

The purpose of this repository is to offer you a comprehensive, step-by-step guide on registering your AKS cluster on Calico Cloud, and securing your cloud-native applications to meet compliance requirements. Although Calico Cloud provides a wide range of functionalities and security features, this workshop will concentrate on a few key features used to protect your workload in runtime and deployment time. If you would like to delve deeper into this topic, please don't hesitate to contact us.

Time Requirements

The estimated time to complete this workshop is 60-90 minutes.

Target Audience

  • Cloud Professionals
  • DevSecOps Professional
  • Site Reliability Engineers (SRE)
  • Solutions Architects
  • Anyone interested in Calico Cloud :)

Learning Objectives

Learn how to:

  • Scan container images and block deployment of vulnerable images.
  • Preview and enforce security policies to protect vulnerable workloads.
  • Implement zero-trust access controls and micro-segmentation to improve the security posture.

Workshop Environment Preparation

⚠️ For this workshop, you are expected to have access to a previously created AKS cluster.

  • Please, follow the instructions on the repository below if you don't have it ready:

    Calico Cloud on AKS - Workshop Environment Preparation

  • We will run this workshop from the Azure Cloud Shell, as described in that repository.

  • To start your cluster, reload the environment variables create in your Azure Cloud Shell first and then start the cluster. Use the following command:

    source ~/workshopvars.env
    az aks start --resource-group $RESOURCE_GROUP --name $CLUSTERNAME

Modules

This workshop is organized in sequential modules. One module will build up on top of the previous module, so please, follow the order as proposed below.

Module 1 - Connect the AKS cluster to Calico Cloud
Module 2 - Scan Container Images
Module 3 - Calico Cloud Admission Controller
Module 4 - Implement zero-trust access controls and micro-segmentation
Module 5 - Clean up


Useful links

Follow us on social media

Note: The examples and sample code provided in this workshop are intended to be consumed as instructional content. These will help you understand how Calico Cloud can be configured to build a functional solution. These examples are not intended for use in production environments.

About

In this AKS-focused workshop, you will work with Calico Cloud to learn how to strengthen your Microsoft AKS cluster security posture.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages