Core Concepts¶
Overview¶
Security Emphasis
Understanding core concepts is essential for making informed security decisions. This learning path establishes a solid foundation in the security principles that underpin Kube CINC Secure Scanner.
This learning path introduces the fundamental concepts and security principles of Kube CINC Secure Scanner. By completing this path, you will understand the architecture, scanning approaches, and security considerations that form the foundation of the scanner.
Time to complete: 60 minutes
Target audience: DevOps engineers, Security professionals, Platform engineers
Security level: Basic to Intermediate
Prerequisites¶
- Basic understanding of Kubernetes
- Familiarity with container security concepts
- Completed the New User Guide or equivalent experience
Learning Path Steps¶
Step 1: Architecture Overview¶
Security Consideration
Understanding the architecture helps you identify potential security boundaries and trust relationships between components.
- Review the architecture documentation:
- Architecture Overview
- Core Components
- Security Components
-
Study the architecture diagrams:
- Component Diagrams
- Deployment Diagrams
Estimated time: 20 minutes
Success criteria: You can describe the main components of Kube CINC Secure Scanner and how they interact from a security perspective.
Step 2: Scanning Approaches¶
Security Consideration
Each scanning approach has different security implications and tradeoffs that must be understood to make appropriate security decisions.
- Learn about the different scanning approaches:
- Approaches Overview
- Approach Comparison
-
Understand the details of each approach:
- Kubernetes API Approach
- Sidecar Container Approach
- Debug Container Approach
- Direct Commands Approach
- Helper Scripts Approach
Estimated time: 20 minutes
Success criteria: You can explain the security tradeoffs between different scanning approaches and identify which is most appropriate for different security scenarios.
Step 3: Security Model¶
Security Consideration
A thorough understanding of the security model helps you implement defense-in-depth strategies appropriate for your environment.
- Review the security model documentation:
- Security Overview
- Security Principles
- Threat Model
-
Understand potential attack vectors:
- Attack Vectors
- Lateral Movement
-
Learn about mitigations:
- Threat Mitigations
- Risk Mitigations
Estimated time: 20 minutes
Success criteria: You can describe the security model, identify key risks, and explain relevant mitigations.
Security Considerations¶
This section provides a comprehensive overview of security considerations for understanding core concepts:
- Trust Boundaries: Understand where trust boundaries exist between components and how they affect security decisions
- Defense in Depth: Recognize how multiple security controls work together to provide layered defense
- Security Tradeoffs: Understand the security implications of different architectural and deployment choices
- Threat Awareness: Identify potential threats to the scanner and how they're mitigated in the design
- Risk Management: Understand how risk is assessed and managed throughout the scanner's architecture
Compliance Relevance¶
This learning path helps address the following compliance requirements:
- Security Control Documentation - Provides understanding needed to document security controls for audits
- Risk Assessment - Establishes foundation for risk assessment activities
- Security Architecture - Supports documentation of security architecture for compliance frameworks
Next Steps¶
After completing this learning path, consider:
- Security-First Implementation - Implement with security as the primary focus
- Implementation Guide - Get detailed implementation instructions
- Advanced Features - Explore advanced security capabilities