Cloud Native - Examining Pod Security Admission
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore the intricacies of Pod Security Admission in this 55-minute CNCF conference talk. Delve into the Baseline Profile, examine the Admission Configuration File, and weigh the pros and cons of various security approaches. Learn about audit logs, caverno comparison, and privileged namespaces. Discover practical use cases and gain insights on enforcing baseline security with caverno. Conclude with key takeaways and a Q&A session to deepen your understanding of Kubernetes pod security.
Syllabus
Intro
Overview
Pod Security Admission
Baseline Profile
Admission Configuration File
Pros
Cons
No enforcement
Audit logs
caverno comparison
caverno cons
use cases
caverno
privileged
Privileged namespaces
Enforce baseline with caverno
Closing points
Questions
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Building on Microsoft Sentinel PlatformMicrosoft via YouTube Securing Applications and Infrastructure on Kubernetes with Sysdig
Mirantis via YouTube Container Escape in 2021
Hack In The Box Security Conference via YouTube Running at Light Speed - Cloud Native Security Patterns
LASCON via YouTube Controlled Mayhem With Cloud Native Security Pipelines
OWASP Foundation via YouTube