Security and RBAC
RBAC Studio Intensive
RoleBindings, aggregation rules, and escalation paths you can defend in an audit conversation.
From 1,180,000 KRW — informational only, no checkout on this site.
Overview
Security and RBAC track condensed into tactile exercises. You will misconfigure on purpose, observe denial signals, then rebuild least-privilege flows that still let developers ship.
What is included
- Subject matrix workshop across users, groups, and service accounts
- Aggregation rule lab with guardrails
- Escalation request template for stakeholder sign-off
- Audit log scavenger hunt with redacted samples
- Admission webhook sketch (conceptual)
- Break-glass procedure card deck
- Peer review of each other's binding graphs
Outcomes
- Document why a binding exists in one paragraph
- Spot risky wildcard verbs before they merge
- Pair policy with namespace boundaries your org already uses
Lead instructor for this track
Security architecture background; insists on handwriting trust boundaries first.
FAQ
Is cloud vendor specific content included?
Examples stay on upstream Kubernetes; we map concepts to major clouds verbally, not inside labs.
Do you cover OPA Gatekeeper?
We reference it as an extension; dedicated policy engine workshops are a separate engagement.
What should I disclose internally before attending?
Bring anonymized snippets only—no customer secrets or production kubeconfigs.
Recent learner notes
-
The aggregation rule afternoon saved us a week of spreadsheet debates.
-
Clearer than the three blog posts I kept rereading on Subjects.