YoVDO

Hacking and Defending Kubernetes Clusters - Live Demonstration

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Courses Cybersecurity Courses Threat Modeling Courses Cluster Security Courses RBAC Courses Container Security Courses MITRE ATT&CK Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Watch a live demonstration of hacking and defending Kubernetes clusters in this conference talk. Explore common attacks and offensive techniques against Kubernetes clusters and workloads, along with runtime controls to protect against them. Witness scenarios including leveraging compromised containers, exploiting RBAC misconfigurations, and hijacking entire clusters. Learn how to contextualize attacks using threat model resources like the MITRE ATT&CKĀ® Containers Matrix and CNCF Financial Services User Group attack trees. Gain insights on threat modeling, security testing, and defending your own Kubernetes clusters through practical examples and expert explanations.

Syllabus

Introduction
Fabian Kammel
Agenda
Threat Modeling
Microsoft Threat Matrix
Setting the Stage
Initial Access Recap
Vulnerability Enumeration
What have we witnessed
How would we mitigate
What have we seen
What can we do
Unauthorized access
Recap
Demo 5 Poisoned Image
Lessons Learned
Mitigations
Attack Vector
Delete Events
Distribution Dependent
Wrap Up


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Kubernetes Certified Application Developer (CKAD) with Tests
Udemy
Kubernetes Certification Training
Edureka
Kubernetes Security
A Cloud Guru
Kubernetes Cluster Guardrails Using Open Policy Agent and Gatekeeper - Mirantis Labs Tech Talks
Mirantis via YouTube
Authentication & Authorization in Kubernetes - Mirantis Labs Tech Talks
Mirantis via YouTube