Continuous Kubernetes Security - Best Practices and Risk Mitigation
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive 46-minute conference talk from the OWASP AppSec EU 2018 DevOps Track that delves into the world of Kubernetes security. Gain insights into the Kubernetes security landscape, risks, security models, and best practices. Learn how to configure users and applications with least-privilege, isolate and segregate workloads, and persist configuration across cluster rebuilds. Discover topics such as workload security, misconfigurations, deployment configuration tools, dashboards, cluster security, TLS node bootstrapping, role-based access control, and more. Understand the importance of pod security policies, resource linting, admission controllers, network policies, and deployment strategies. Equip yourself with the knowledge to navigate the complexities of Kubernetes security and ensure a robust, multi-tenanted infrastructure.
Syllabus
Introduction
About Andrew
Why does this matter
Why not security
Everything is fine
Cuban actors
Agenda
Kubernetes is insecure
A back model
workload security
misconfigurations
deployment configuration tool
dashboard
cluster
security again
what Kubernetes looks like
bootstrap TLS nodes
back role access control
Legacy Authorization
Secure Port
Leaking Secrets
Certificate rotation
Pods
Table Security Policies
Resource linting
Deployments
Labels
Containers
Admission Controllers
Limit Ranger
Security Policy
Encryption
Sealed Secrets
Token Requests
Networking
Network Policy
Service Mesh
Deployment Strategies
Recap
Multiple Clusters
Container Runtimes
Taught by
OWASP Foundation
Related Courses
AZ-500: Microsoft Azure Security Technologies (LA)A Cloud Guru Kubernetes Security
A Cloud Guru Scenario Based Docker Security
A Cloud Guru Scenario Based LXD/LXC Security
A Cloud Guru Secure Container Host Operating System
A Cloud Guru