YoVDO

Cloud Native - Examining Pod Security Admission

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Pod Security Admission in this 55-minute CNCF conference talk. Delve into the Baseline Profile, examine the Admission Configuration File, and weigh the pros and cons of various security approaches. Learn about audit logs, caverno comparison, and privileged namespaces. Discover practical use cases and gain insights on enforcing baseline security with caverno. Conclude with key takeaways and a Q&A session to deepen your understanding of Kubernetes pod security.

Syllabus

Intro
Overview
Pod Security Admission
Baseline Profile
Admission Configuration File
Pros
Cons
No enforcement
Audit logs
caverno comparison
caverno cons
use cases
caverno
privileged
Privileged namespaces
Enforce baseline with caverno
Closing points
Questions


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Building on Microsoft Sentinel Platform
Microsoft via YouTube
Securing Applications and Infrastructure on Kubernetes with Sysdig
Mirantis via YouTube
Container Escape in 2021
Hack In The Box Security Conference via YouTube
Running at Light Speed - Cloud Native Security Patterns
LASCON via YouTube
Controlled Mayhem With Cloud Native Security Pipelines
OWASP Foundation via YouTube