Course imagery for CKS Supply Chain Guardrails

CKS Supply Chain Guardrails

Focused track on image provenance, SBOM reading, and runtime monitoring patterns aligned to CKS domain expectations.

Duration
4 weeks · 26 lab hours
Format
Live evening labs
Tuition (informational)
KRW 780,000

Overview

You will interrogate SBOM fragments, simulate tampered images, and wire policy decisions that remain legible to application teams. The emphasis stays on clarity: policies people can read, not opaque deny-all rules.

What you work through

  • SBOM diff exercises with realistic semver jumps
  • ImagePullSecret rotation without downtime windows
  • Runtime monitoring baselines with tuned noise floors
  • Falco rule tuning with annotated false positives
  • ServiceAccount least privilege templates
  • Evidence packs for change advisory boards
  • Scenario cards for tabletop facilitation

Outcomes

  • Author a policy change with linked SBOM evidence
  • Tune a runtime rule with documented false positive handling
  • Facilitate a 20-minute tabletop using provided scenario cards

Facilitator

Ren Ishikawa

Certification Coach bridging platform defaults and security review culture.

Participant notes

SBOM diff homework felt niche until our release manager asked the same question the next week.
Ivy · Logistics tech

Course questions

We use open-source oriented stacks. Commercial integrations are discussed conceptually only.