YoVDO

How Attackers Use Exposed Prometheus Servers to Exploit Kubernetes Clusters

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Courses Cybersecurity Courses Prometheus Courses Data Protection Courses Cloud Security Courses Vulnerability Assessment Courses Cluster Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how attackers exploit exposed Prometheus servers to compromise Kubernetes clusters in this informative conference talk. Discover the wealth of sensitive information attackers can gather for fingerprinting, including kernel versions, IP addresses, instance types, and library versions. Learn about the reconnaissance techniques used to assess vulnerabilities and gain insights into protecting your cluster. Understand the secrets collected during the initial stages of an attack and how this information can be leveraged internally for improved security. Gain valuable knowledge on preventing the exposure of sensitive data and strengthening your cluster's defenses. Recognize the importance of securing every link in the chain, even when following best practices. This 22-minute presentation by David de Torres Huerta and Miguel Hernández from Sysdig offers crucial insights for Kubernetes administrators and security professionals looking to enhance their cluster's security posture.

Syllabus

How Attackers Use Exposed Prometheus Server to Exploit... David de Torres Huerta & Miguel Hernández


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

CompTIA PenTest+ Certification
A Cloud Guru
AWS SimuLearn: Cyber Security Threats
Amazon Web Services via AWS Skill Builder
Ethical Hacking
Cabrillo College via California Community Colleges System
Network Security
City College of San Francisco via California Community Colleges System
Ethical Hacking
Chaffey College via California Community Colleges System