Thorsten

DENIC

13th place

3280 points


Solves

Challenge Category Value Time
Encryption - Task1 Encryption 50
Encryption - Start Lab Encryption 10
Capabilities Runtime Hardening 50
Resource Management Runtime Hardening 50
Security Context3 Runtime Hardening 50
Security Context2 Runtime Hardening 50
Security Context1 Runtime Hardening 50
Linux Namespace2 Runtime Hardening 60
Linux Namespace1 Runtime Hardening 50
Volumes2 Encryption 50
Volumes1 Encryption 50
Encryption Configuration1 Encryption 50
Types1 Secret Management 50
Types2 Secret Management 50
Encryption Secret Management 50
etcd Secret Management 50
Network Policies - Task3 Network Policies 100
Network Policies - Task2 Network Policies 150
Network Policies - Task1 Network Policies 20
Network Policies - Start Lab Network Policies 10
Implementations Network Policies 50
Requirements Network Policies 50
Kubernetes Network Traffic Network Policies 50
Network Policy3 Network Policies 100
Network Policy2 Network Policies 100
Network Policy1 Network Policies 100
Audit Logging - Task2 Audit Logging 100
Audit Logging - Task1 Audit Logging 100
Audit Logging - Start Lab Audit Logging 10
Kubeapi Parameters Audit Logging 50
Audit Stages Audit Logging 50
Audit Level Audit Logging 50
Audit Component Audit Logging 50
Audit Policy Audit Logging 100
RBAC - Task4 RBAC 100
RBAC - Task3 RBAC 80
RBAC - Task1 RBAC 50
RBAC - Task2 RBAC 50
RBAC - Start Lab RBAC 10
Role3 RBAC 50
Core Component Roles RBAC 50
Anonymous RBAC 50
Alternative RBAC 50
Role2 RBAC 50
Role1 RBAC 50
Service Account Permissions RBAC 50
Service Account Token2 RBAC 50
Most Powerful Role RBAC 50
Introduction - Task3 Introduction 100
Introduction - Task2 Introduction 50
Introduction - Task1 Introduction 20
Introduction - Start Lab Introduction 10
Kubernetes Components2 Introduction 100
Kubernetes Services Introduction 50
Kubernetes Components1 Introduction 50
Kubernetes Names3 Introduction 50
Kubernetes Names2 Introduction 50
Kubernetes Names1 Introduction 50