Hacking Containers, Kubernetes and Clouds
Offered By: media.ccc.de via YouTube
Course Description
Overview
Explore the vulnerabilities in container security, Kubernetes clusters, and cloud environments in this 26-minute conference talk. Discover how tokens, often carelessly left exposed, can be exploited to gain unauthorized access to powerful systems. Follow along as the speaker demonstrates a real-world attack on an OpenShift cluster that meets NIST and CIS security standards. Learn how hijacking a single container can lead to full cluster control, host access, and even compromise cloud resources. Gain insights into the far-reaching consequences of token mismanagement in cloud environments, including the potential to manipulate virtual machines, storage, and derived accounts. Access additional open-source training materials on Kubernetes security to further enhance your understanding of these critical issues.
Syllabus
Hacking Containers, Kubernetes and Clouds
Taught by
media.ccc.de
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Designing Highly Scalable Web Apps on Google Cloud Platform
Google via Coursera Windows Server 2016: Azure for On-Premises Administrators
Microsoft via edX Essential Google Cloud Infrastructure: Foundation
Google Cloud via Coursera Unlock Your Digital Business with SAP HANA Enterprise Cloud
SAP Learning