Skip to content

Domain 3: Minimize Microservice Vulnerabilities

Overview

Minimize Microservice Vulnerabilities is the highest weighted domain in the CKS exam, accounting for 20% of the total exam score. This domain focuses on securing individual workloads, pods, and containers running within the cluster -- the actual microservices that make up your applications.

Highest Weight Domain -- 20%

This is the single most important domain on the CKS exam. You cannot afford to lose points here. Master every topic thoroughly: SecurityContexts, Secrets encryption, OPA/Gatekeeper, runtime sandboxing, mTLS, admission controllers, and container hardening. A strong performance in this domain can make or break your exam result.

Topic Mindmap

Key Concepts at a Glance

ConceptWhat It DoesExam Relevance
SecurityContextControls pod/container-level Linux security settingsVery High -- expect 2-3 questions
Secrets EncryptionEncrypts secrets at rest in etcdHigh -- EncryptionConfiguration setup
OPA/GatekeeperPolicy-as-code admission controlHigh -- write ConstraintTemplates
RuntimeClassAssigns sandboxed runtimes to podsMedium -- configure gVisor/Kata
mTLSEncrypts service-to-service communicationMedium -- Istio concepts
Admission ControllersIntercepts API requests for validation/mutationHigh -- webhook configuration
Container HardeningReduces container attack surfaceMedium -- Dockerfile + pod spec

What to Expect in the Exam

The CKS exam is performance-based, meaning you will work directly on live Kubernetes clusters. For this domain, expect tasks such as:

Task TypeLikelihoodDifficulty
Configure SecurityContext on pods/containersVery HighMedium
Set up encryption at rest for secretsHighHard
Create OPA/Gatekeeper policiesHighHard
Configure RuntimeClass for sandboxingMediumMedium
Fix admission controller configurationsMediumHard
Harden container specificationsHighMedium
Identify and fix secret exposureHighEasy-Medium

Time Management

This domain's 20% weight means roughly 24 minutes of a 2-hour exam should be dedicated to these topics. However, OPA/Gatekeeper and EncryptionConfiguration tasks can be time-consuming. Practice writing Rego policies and EncryptionConfiguration YAML from memory -- you will not have time to construct these from scratch during the exam.

Defense in Depth Strategy

The topics in this domain form concentric layers of security around your microservices:

Study Strategy

Work through these topics in order. Security Contexts and Secrets are foundational -- nearly every other topic builds on understanding pod specifications. OPA/Gatekeeper is the most complex new concept, so allocate extra study time. Runtime sandboxing and mTLS are more conceptual but still require hands-on practice.

Section Contents

SectionTopicKey Skills
Security ContextsPod and container security settingsYAML configuration, Linux security
Secrets ManagementEncryption at rest, secret handlingEncryptionConfiguration, etcd
OPA/GatekeeperPolicy-as-code admission controlRego, ConstraintTemplates
Runtime SandboxinggVisor, Kata, RuntimeClassRuntimeClass configuration
mTLS & Service MeshService-to-service encryptionIstio, PeerAuthentication
Admission ControllersWebhooks and built-in controllersWebhook configuration
Container HardeningMinimal images, non-root, read-onlyDockerfile, pod spec hardening
Practice Questions25 exam-style questionsAll domain topics
SolutionsDetailed solutions with explanationsStep-by-step walkthroughs

Released under the MIT License.