paul

password1234

14th place

2990 points


Solves

Challenge Category Value Time
Architecture Service Mesh 50
Pod Security Admission1 Admission Controller 50
Admission Policies Admission Controller 50
Types2 Admission Controller 50
Types3 Admission Controller 50
Network Policy3 Network Policies 100
Network Policy2 Network Policies 100
Implementations Network Policies 50
Kubernetes Network Traffic Network Policies 50
Requirements Network Policies 50
ebpf Service Mesh 50
How many Proxies Service Mesh 50
PeerAuthentication policy2 Service Mesh 50
RequestAuthentication Service Mesh 50
AuthorizationPolicy Service Mesh 50
PeerAuthentication policy1 Service Mesh 50
Encryption Service Mesh 50
Network Encryption 50
Volumes2 Encryption 50
Volumes1 Encryption 50
Providers Encryption 50
Encryption Configuration1 Encryption 50
Linux Namespace2 Runtime Hardening 60
Capabilities Runtime Hardening 50
Resource Management Runtime Hardening 50
Security Context3 Runtime Hardening 50
Security Context2 Runtime Hardening 50
Security Context1 Runtime Hardening 50
Linux Namespace1 Runtime Hardening 50
Types2 Secret Management 50
Types1 Secret Management 50
Encryption Secret Management 50
etcd Secret Management 50
Audit Policy Audit Logging 100
Audit Component Audit Logging 50
Kubeapi Parameters Audit Logging 50
Audit Level Audit Logging 50
Audit Stages Audit Logging 50
RBAC - Task4 RBAC 100
RBAC - Task3 RBAC 80
RBAC - Task2 RBAC 50
RBAC - Task1 RBAC 50
Core Component Roles RBAC 50
Anonymous RBAC 50
Role3 RBAC 50
Role2 RBAC 50
Role1 RBAC 50
Service Account Permissions RBAC 50
Service Account Token2 RBAC 50
Introduction - Task2 Introduction 50
Kubernetes Services Introduction 50
Kubernetes Components1 Introduction 50
Kubernetes Names3 Introduction 50
Kubernetes Names2 Introduction 50
Kubernetes Names1 Introduction 50