Skip to content

Prerequisites for CKS

You already hold your CKA -- congratulations. The Certified Kubernetes Security Specialist (CKS) builds directly on top of everything CKA tested, but it shifts the lens entirely to security. This section maps out exactly what additional knowledge you need, what tools to learn, and the recommended order to study.

CKA-to-CKS Learning Path

What CKA Already Covers (Relevant to CKS)

Your CKA certification means you already have a solid foundation in these areas. CKS does not re-test the basics, but it deepens several of them:

CKA TopicCKS Relevance
RBACCKA covers creating Roles/ClusterRoles. CKS requires you to audit, harden, and detect misconfigurations in RBAC.
Network PoliciesCKA covers basic ingress rules. CKS expects egress policies, default-deny, and namespace isolation patterns.
TLS & CertificatesCKA covers certificate signing requests. CKS expects you to rotate certificates, configure mTLS, and verify certificate chains.
etcdCKA covers backup/restore. CKS expects you to encrypt etcd at rest and secure the etcd endpoint.
Pod SecurityCKA covers securityContext basics. CKS requires Pod Security Standards/Admission, OPA Gatekeeper, and deep securityContext hardening.
KubeconfigCKA covers context switching. CKS expects you to restrict access, manage multiple identities, and audit kubeconfig files.
NamespacesCKA uses them for organization. CKS uses them as security boundaries with resource quotas, network policies, and RBAC scoping.

Key Insight

CKA asks: "Can you configure it?" CKS asks: "Can you secure it, detect when it's misconfigured, and fix it under pressure?"

What's NEW in CKS (Beyond CKA)

These topics are not covered at all in CKA and represent the core of what you need to learn:

1. Supply Chain Security

  • Image scanning with Trivy to find vulnerabilities in container images
  • Image signing and verification (Cosign, Notary concepts)
  • Allowed registries -- restricting which registries pods can pull from
  • Static analysis of Kubernetes manifests (kubesec, conftest)
  • ImagePolicyWebhook admission controller for runtime image verification

2. Runtime Security & Monitoring

  • Falco -- real-time kernel-level threat detection using syscall monitoring
  • Audit logging -- configuring the API server audit policy to track who did what
  • Behavioral analysis -- detecting anomalous container behavior at runtime
  • Immutable containers -- enforcing read-only root filesystems, no privilege escalation

3. Linux Kernel Security Mechanisms

  • Seccomp profiles -- restricting which syscalls a container can make
  • AppArmor profiles -- Mandatory Access Control for file/network/capability restrictions
  • Linux capabilities -- fine-grained privilege control (drop ALL, add only what's needed)
  • SELinux (conceptual understanding, less hands-on in the exam)

4. Admission Controllers (In Depth)

  • OPA Gatekeeper -- writing and enforcing custom admission policies using Rego
  • Pod Security Admission -- enforcing Baseline/Restricted security standards at namespace level
  • Validating and Mutating Webhooks -- how admission control pipelines work
  • ImagePolicyWebhook -- denying containers from untrusted sources

5. Advanced Network Security

  • Ingress with TLS termination -- securing ingress resources properly
  • mTLS with service meshes (conceptual -- mutual TLS between services)
  • Network-level isolation beyond basic NetworkPolicy (Cilium, Calico features)

6. Cluster Hardening

  • CIS Benchmarks -- using kube-bench to audit cluster configuration against CIS standards
  • API server hardening -- disabling anonymous auth, configuring admission plugins, audit logging
  • kubelet security -- protecting the kubelet API, disabling read-only port
  • Secrets management -- encrypting secrets at rest, external secret stores, avoiding secrets in env vars

Exam Reality Check

The CKS exam is 100% hands-on in a terminal. You will not get multiple-choice questions. Every topic above requires you to type commands, edit YAML, and fix configurations under a 2-hour time limit.

Security Tools You Need to Learn

The following tools appear either directly on the CKS exam or are essential for practice:

ToolWhat It DoesExam Relevance
TrivyScans container images and configs for CVEsDirectly used on exam
FalcoMonitors syscalls for suspicious runtime behaviorDirectly used on exam
kube-benchAudits cluster against CIS Kubernetes BenchmarkDirectly used on exam
OPA / GatekeeperEnforces custom admission policiesDirectly used on exam
kubesecScores Kubernetes manifests for security risksGood for practice
AppArmorLinux kernel module for mandatory access controlDirectly used on exam
SeccompLinux kernel feature to filter system callsDirectly used on exam
conftestTests structured data against OPA/Rego policiesUseful for practice

Linux Security Fundamentals (Beyond CKA)

CKA expects you to be comfortable with Linux. CKS expects you to understand Linux security primitives at a deeper level:

Must-Know Concepts

  1. Linux Namespaces -- How containers achieve process isolation (PID, NET, MNT, UTS, IPC, USER namespaces)
  2. cgroups -- Resource limits and accounting that enforce container boundaries
  3. Linux Capabilities -- The 40+ capabilities that break down root's power (CAP_NET_ADMIN, CAP_SYS_PTRACE, etc.)
  4. Seccomp -- Berkeley Packet Filter (BPF) programs that filter syscalls at the kernel level
  5. AppArmor -- Profile-based MAC system that restricts file access, network access, and capabilities
  6. SELinux -- Label-based MAC system (know concepts; exam focuses more on AppArmor)
  7. /proc filesystem -- How container information leaks through /proc and how to restrict it
How Containers Use These Primitives

When a container starts, the container runtime:

  1. Creates new namespaces (PID, NET, MNT, etc.) to isolate the process
  2. Sets cgroup limits to restrict CPU, memory, and I/O
  3. Drops capabilities that the process does not need
  4. Applies a seccomp profile to block dangerous syscalls
  5. (Optionally) loads an AppArmor profile for file and network restrictions

CKS tests your ability to configure and verify steps 3-5 for pods.

Key Files and Paths to Know

PathPurpose
/etc/apparmor.d/AppArmor profile definitions
/proc/<pid>/statusCheck seccomp mode and capabilities of a running process
/proc/<pid>/attr/currentCurrent AppArmor profile for a process
/var/lib/kubelet/seccomp/Default location for seccomp profiles on nodes
/etc/kubernetes/manifests/Static pod manifests (API server, etcd, etc.)
/etc/kubernetes/pki/Cluster PKI certificates and keys

Follow this order to build knowledge incrementally. Each domain builds on the previous ones:

Study Time Estimate

Most CKA holders spend 4 to 6 weeks preparing for CKS with 1-2 hours of daily study. If you are already comfortable with Linux security concepts, you may need less time. If Linux security is entirely new to you, budget 6-8 weeks.

Week-by-Week Suggested Plan

WeekFocusKey Activities
Week 1Prerequisites + Lab SetupSet up Kind cluster, install tools, review Linux security basics
Week 2Cluster Setup & HardeningCIS benchmarks with kube-bench, RBAC auditing, Network Policies
Week 3System HardeningAppArmor profiles, Seccomp profiles, Linux capabilities
Week 4Microservice VulnerabilitiesSecurity contexts, Pod Security Admission, OPA Gatekeeper, Secrets
Week 5Supply Chain SecurityTrivy scanning, image policies, static analysis
Week 6Runtime Security + ReviewFalco rules, audit logging, immutable containers, mock exams

Next Steps

Before diving into the CKS domains, make sure you:

  1. Read the CKA to CKS Bridge -- understand exactly what security concepts are new
  2. Set up your Lab Environment -- you cannot learn CKS without hands-on practice
  3. Take the Self-Assessment Quiz -- identify your specific knowledge gaps
  4. Check your answers in the Solutions

Released under the MIT License.