Hacking and Defending Kubernetes Clusters - Live Demonstration
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Watch a live demonstration of hacking and defending Kubernetes clusters in this conference talk. Explore common attacks and offensive techniques against Kubernetes clusters and workloads, along with runtime controls to protect against them. Witness scenarios including leveraging compromised containers, exploiting RBAC misconfigurations, and hijacking entire clusters. Learn how to contextualize attacks using threat model resources like the MITRE ATT&CKĀ® Containers Matrix and CNCF Financial Services User Group attack trees. Gain insights on threat modeling, security testing, and defending your own Kubernetes clusters through practical examples and expert explanations.
Syllabus
Introduction
Fabian Kammel
Agenda
Threat Modeling
Microsoft Threat Matrix
Setting the Stage
Initial Access Recap
Vulnerability Enumeration
What have we witnessed
How would we mitigate
What have we seen
What can we do
Unauthorized access
Recap
Demo 5 Poisoned Image
Lessons Learned
Mitigations
Attack Vector
Delete Events
Distribution Dependent
Wrap Up
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Ethical Hacking: Introduction to Ethical HackingLinkedIn Learning Blue Team Tools: Defense against Adversary Activity Using MITRE Techniques
Pluralsight Intro to Purple Team - Cyber Threat Intelligence, Attack, Detect, Respond
RSA Conference via YouTube Lessons from Applying MITRE ATT&CK in the Wild
RSA Conference via YouTube Generating MITRE ATT&CK DNA for Groups of Actors
Cooper via YouTube