YoVDO

Kubernetes Privilege Escalation Tactics - Understanding and Mitigating Vulnerabilities

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Penetration Testing Courses Threat Detection Courses Vulnerability Assessment Courses Privilege Escalation Courses Cluster Security Courses Container Security Courses Cloud-Native Security Courses Adversary Simulation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced Kubernetes security vulnerabilities and privilege escalation tactics in this 29-minute conference talk by Andrew Martin and Iain Smart from ControlPlane. Dive into the world of cloud native security, learning how rogue insiders, disgruntled developers, and external threats can exploit Kubernetes clusters. Discover techniques for escalating privileges, maintaining persistence, causing cluster-wide damage, and concealing malicious activities. Gain insights into best practices for detection and cost-effective strategies to secure your clusters. Understand critical Kubernetes vulnerabilities that SREs, security teams, and penetration testers should be aware of, along with mitigation techniques. Examine edge cases of component abuse and unusual interactions between components. Learn to identify various adversary levels and tailor defenses accordingly. Walk away with knowledge of the most economical and rapid strategies for robust cluster security in this enthralling exploration of Kubernetes privilege escalation tactics.

Syllabus

I'll Let Myself In: Kubernetes Privilege Escalation Tactics - Andrew Martin & Iain Smart


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

I Simulate Therefore I Catch - Enhancing Detection Engineering with Adversary Simulation
YouTube
Embrace the Red - Enhancing Detection Capabilities with Adversary Simulation
YouTube
So You Think You Can Secure Your Cloud - Red Team Engagements in GCP
Security BSides San Francisco via YouTube
Ferris Bueller's Guide to Abuse Domain Permutations
Security BSides San Francisco via YouTube
ICS OSINT - An Attacker’s Perspective
RSA Conference via YouTube