CKS - Certified Kubernetes Security Specialist¶
The Certified Kubernetes Security Specialist (CKS) exam validates a candidate's ability to secure Kubernetes clusters and cloud native applications. It is widely considered the most difficult of the five CNCF Kubernetes certifications, as it requires deep hands-on expertise across cluster hardening, supply chain security, runtime threat detection, and more. The exam is entirely performance-based, meaning you must solve real security tasks in live Kubernetes environments under time pressure.
Hardest Exam in the Kubestronaut Path
The CKS is consistently rated as the most challenging of the five certifications. It requires solid CKA-level cluster administration skills plus extensive security knowledge. Do not underestimate the breadth of tooling (Falco, Trivy, AppArmor, seccomp, OPA/Gatekeeper, etc.) you are expected to know hands-on.
Exam Details¶
| Detail | Information |
|---|---|
| Format | Performance-based (hands-on CLI) |
| Duration | 2 hours |
| Tasks | 15-20 |
| Passing Score | 67% |
| Cost | $445 |
| Validity | 2 years |
| Prerequisites | Active CKA certification |
| Exam Platform | PSI Online Proctoring |
| Allowed Resources | Kubernetes Documentation, Kubernetes Blog, Trivy Documentation, Falco Documentation, AppArmor Documentation |
| Registration | Linux Foundation Training Portal |
Exam Tip
The CKS is a performance-based exam where you work in real Kubernetes clusters via a terminal. You have access to the Kubernetes documentation and selected tool documentation during the exam. Bookmark key pages for NetworkPolicies, RBAC, Pod Security Standards, audit policies, and Falco rules before your exam session.
Domain Breakdown¶
| Domain | Weight |
|---|---|
| Cluster Setup | 15% |
| Cluster Hardening | 15% |
| System Hardening | 10% |
| Minimize Microservice Vulnerabilities | 20% |
| Supply Chain Security | 20% |
| Monitoring, Logging and Runtime Security | 20% |
pie title CKS Exam Domain Weights
"Cluster Setup" : 15
"Cluster Hardening" : 15
"System Hardening" : 10
"Microservice Vulnerabilities" : 20
"Supply Chain Security" : 20
"Monitoring, Logging & Runtime" : 20 Focus Areas
Minimize Microservice Vulnerabilities, Supply Chain Security, and Monitoring, Logging and Runtime Security together account for 60% of the exam. Prioritize these three domains in your study plan, but do not neglect the fundamentals covered in Cluster Setup and Hardening.
Exam Tools Reference¶
These are the tools you are expected to know hands-on during the CKS exam:
| Tool | Purpose | Relevance |
|---|---|---|
kubectl | Cluster management, RBAC, Secrets, PSA, NetworkPolicies | Critical |
kubeadm | Cluster upgrades, KubeletConfiguration | High |
etcdctl | Read Secrets from etcd, verify encryption at rest | High |
trivy | Image vulnerability scanning, SBOM generation (CycloneDX), SBOM scanning | High |
falco | Runtime security, custom rule authoring, syscall monitoring | High |
kube-bench | CIS Benchmark checks and remediation | High |
bom | SBOM generation (SPDX-JSON format) | Medium |
kubesec | Static analysis for Kubernetes manifests | Medium |
kube-linter | Static analysis for Kubernetes manifests and Helm charts | Medium |
apparmor_parser | Load and manage AppArmor profiles | Medium |
crictl | Container runtime debugging (list/inspect containers) | Medium |
openssl | Certificate generation, CSR creation, TLS verification | Medium |
cosign | Image signing and verification (Sigstore) | Medium |
strace | Syscall tracing for building seccomp profiles | Low |
Exam Documentation Access
During the exam you have access to: Kubernetes Docs, Trivy Docs, Falco Docs, and AppArmor Docs. Bookmark key pages before the exam: NetworkPolicy, CiliumNetworkPolicy, RBAC, Pod Security Standards, Audit Policy, Falco Rules, and EncryptionConfiguration.
Key Resources¶
| Resource | Description |
|---|---|
| CKS Curriculum (PDF) | Official CNCF exam curriculum |
| CKS Registration | Register for the CKS exam |
| Kubernetes Security Docs | Official Kubernetes security documentation |
| Killer Shell CKS Simulator | Exam simulator included with registration (2 free sessions) |
| Falco Documentation | Runtime security and threat detection |
| Trivy Documentation | Container image vulnerability scanning |
| AppArmor Documentation | Kubernetes AppArmor integration |
| CKS Study Guide by Walid Shaari | Community-curated study resources |
| Kim Wuestkamp's CKS Course | Free video course on YouTube (11h+) |
| Killercoda CKS Scenarios | Free interactive browser-based labs |
| KodeKloud CKS Course | Video course with hands-on labs |