Security and RBAC

RBAC Studio Intensive

RoleBindings, aggregation rules, and escalation paths you can defend in an audit conversation.

Duration
3 days
Format
In-person Seoul
Skill level
Intermediate
Certification focus
CKS adjacent patterns
Team size
Solo

From 1,180,000 KRW — informational only, no checkout on this site.

Program cover art for RBAC Studio Intensive

Overview

Security and RBAC track condensed into tactile exercises. You will misconfigure on purpose, observe denial signals, then rebuild least-privilege flows that still let developers ship.

What is included

  • Subject matrix workshop across users, groups, and service accounts
  • Aggregation rule lab with guardrails
  • Escalation request template for stakeholder sign-off
  • Audit log scavenger hunt with redacted samples
  • Admission webhook sketch (conceptual)
  • Break-glass procedure card deck
  • Peer review of each other's binding graphs

Outcomes

  • Document why a binding exists in one paragraph
  • Spot risky wildcard verbs before they merge
  • Pair policy with namespace boundaries your org already uses

Lead instructor for this track

Yuki Taneda

Security architecture background; insists on handwriting trust boundaries first.

FAQ

Is cloud vendor specific content included?

Examples stay on upstream Kubernetes; we map concepts to major clouds verbally, not inside labs.

Do you cover OPA Gatekeeper?

We reference it as an extension; dedicated policy engine workshops are a separate engagement.

What should I disclose internally before attending?

Bring anonymized snippets only—no customer secrets or production kubeconfigs.

Recent learner notes

  • The aggregation rule afternoon saved us a week of spreadsheet debates.

    — Devon · Regional SaaS studio · 5/5
  • Clearer than the three blog posts I kept rereading on Subjects.