CKS Exam Question 36

You're setting up a new Kubernetes cluster for a critical application, and you want to ensure that only authorized users can access the cluster's API server. Implement a solution using RBAC to achieve this, outlining the steps and the necessary configurations.

CKS Exam Question 37

You suspect that the Kubernetes binaries on your cluster nodes may have been tampered with. Implement a process to verify the integrity of the binaries and identify any potential compromises.

CKS Exam Question 38

Your organization is running a critical application in a Kubernetes cluster, and you need to implement a system to monitor and detect any malicious activity within the containers. Describe how you can leverage audit logs and container runtime security tools like Sysdig to achieve this goal.

CKS Exam Question 39

Your organization has a policy requiring all Kubernetes deployments to utilize Pod Security Policies (PSPs) to enforce security best practices. You're responsible for creating a PSP that enforces the following:
- Only allows containers with a specific security context (privileged: false, runAsUser: 1000, readOnlyRootFilesystem: true)
- Restricts access to most resources by denying the 'hostPort and 'hostNetwork' capabilities.
- Prohibits the use of privileged containers.
Implement the required PSP configuration

CKS Exam Question 40

You need to configure a Kubernetes cluster to use a pod security policy (PSP) that restricts the use of privileged containers and specific capabilities. You want to only allow specific pods in the 'production' namespace to run With the 'NET_ADMIN' capability.