YoVDO

From the Cluster to the Cloud: Lateral Movements in Kubernetes

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Courses Cybersecurity Courses OpenID Connect (OIDC) Courses Cloud Security Courses Threat Detection Courses Lateral Movement Courses RBAC Courses Container Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore novel techniques used in recent real-world attacks that enabled adversaries to move laterally from a container in a Kubernetes cluster to external cloud resources in this 36-minute conference talk. Delve into inner-cluster lateral movement, focusing on Kubernetes RBAC configurations that unexpectedly allowed such movements and served as the root cause of vulnerabilities in containerized applications. Learn how to identify these activities using native Kubernetes tools. Examine cluster-to-cloud lateral movement, with emphasis on cluster-to-cloud authentication methods employed by major cloud providers like Azure, AWS, and GCP. Understand the three main authentication approaches: direct/modified access to IMDS, using Kubernetes as an OIDC identity provider, and storing credentials on underlying nodes. Analyze real-world incidents of cloud environment takeovers originating from Kubernetes clusters, and discover methods to prevent and detect such activities.

Syllabus

From the Cluster to the Cloud: Lateral Movements in Kubernetes - Yossi Weizman & Ram Pliskin


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Securing ASP.NET Core 2 with OAuth2 and OpenID Connect
Pluralsight
Securing ASP.NET Core 3 with OAuth2 and OpenID Connect
Pluralsight
Spring Framework: Using Spring Security OAuth2 Login
Pluralsight
Authentication and Authorization in PHP
Pluralsight
Securing Angular Apps with OpenID Connect and OAuth 2
Pluralsight