Insights into Unsecured Kubernetes in the Wild
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore insights into unsecured Kubernetes clusters in the wild through this conference talk. Discover the findings of Jay Chen and Aviv Sasson from Palo Alto Networks, who uncovered 2,100 unsecured Kubernetes clusters comprising 5,300 nodes, 31,340 CPUs, and 75,270 pods on the internet. Learn about the sensitive data leaks, including access credentials, source code, and PII, from these clusters. Gain knowledge about the honeypot infrastructure used to collect and monitor malicious activities targeting Kubernetes environments. Understand the first malware that exploited Kubelets to compromise Kubernetes, its sophisticated evasion tactics, credential harvesting, lateral movement, and cryptojacking operations. Delve into topics such as Graboid, research methods, reactive research, and best practices for protection. Explore layers of defense, community services, and ephemeral workload design to enhance Kubernetes security.
Syllabus
Introduction
About Graboid
Research Methods
Reactive Research
Conclusion
How can we protect ourselves
Best practices
Layer of defense
Community Services
ephemeral workload design
Outro
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Cloud-Native Development with SAP Cloud PlatformSAP Learning Create and Deliver Cloud-Native SAP S/4HANA Extensions
SAP Learning Kyma – A Flexible Way to Connect and Extend Applications
SAP Learning Cloud Application Development Foundations
IBM via Coursera Cloud-Native Development Using Java with Eclipse MicroProfile
LinkedIn Learning