YoVDO

Hacking and Defending Kubernetes Clusters - Live Demonstration

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Courses Cybersecurity Courses Threat Modeling Courses Cluster Security Courses RBAC Courses Container Security Courses MITRE ATT&CK Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Watch a live demonstration of hacking and defending Kubernetes clusters in this conference talk. Explore common attacks and offensive techniques against Kubernetes clusters and workloads, along with runtime controls to protect against them. Witness scenarios including leveraging compromised containers, exploiting RBAC misconfigurations, and hijacking entire clusters. Learn how to contextualize attacks using threat model resources like the MITRE ATT&CK® Containers Matrix and CNCF Financial Services User Group attack trees. Gain insights on threat modeling, security testing, and defending your own Kubernetes clusters through practical examples and expert explanations.

Syllabus

Introduction
Fabian Kammel
Agenda
Threat Modeling
Microsoft Threat Matrix
Setting the Stage
Initial Access Recap
Vulnerability Enumeration
What have we witnessed
How would we mitigate
What have we seen
What can we do
Unauthorized access
Recap
Demo 5 Poisoned Image
Lessons Learned
Mitigations
Attack Vector
Delete Events
Distribution Dependent
Wrap Up


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera