Hacking and Defending Kubernetes Clusters - Live Demonstration
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Watch a live demonstration of hacking and defending Kubernetes clusters in this conference talk. Explore common attacks and offensive techniques against Kubernetes clusters and workloads, along with runtime controls to protect against them. Witness scenarios including leveraging compromised containers, exploiting RBAC misconfigurations, and hijacking entire clusters. Learn how to contextualize attacks using threat model resources like the MITRE ATT&CK® Containers Matrix and CNCF Financial Services User Group attack trees. Gain insights on threat modeling, security testing, and defending your own Kubernetes clusters through practical examples and expert explanations.
Syllabus
Introduction
Fabian Kammel
Agenda
Threat Modeling
Microsoft Threat Matrix
Setting the Stage
Initial Access Recap
Vulnerability Enumeration
What have we witnessed
How would we mitigate
What have we seen
What can we do
Unauthorized access
Recap
Demo 5 Poisoned Image
Lessons Learned
Mitigations
Attack Vector
Delete Events
Distribution Dependent
Wrap Up
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera