YoVDO

Introducing the OWASP Top Ten for Kubernetes

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Supply Chain Security Courses RBAC Courses Container Security Courses Network Segmentation Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the OWASP Top Ten for Kubernetes in this informative 22-minute conference talk by Jimmy Mesta from KSOC Labs, Inc. Gain insights into the most common Kubernetes risks identified by the Open Web Application Security Project (OWASP) community. Learn about insecure workload configurations, supply chain vulnerabilities, overly permissive RBAC settings, and the importance of centralized policy enforcement. Discover the challenges of broken authentication mechanisms, missing network segmentation controls, and misconfigured cluster components. Understand the risks associated with outdated and vulnerable Kubernetes components. Get involved in this open-source project and enhance your knowledge of containerized infrastructure security. Perfect for developers, security professionals, and Kubernetes enthusiasts looking to improve their understanding of cloud-native security practices.

Syllabus

Intro
Insecure Workload Configurations
Supply Chain Vulnerabilities
Overly Permissive RBAC Configurations
Lack of Centralized Policy Enforcement
Broken Authentication Mechanisms
Missing Network Segmentation Controls
Misconfigured Cluster Components
Outdated and Vulnerable Kubernetes Components


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Cyber Security in Manufacturing
University at Buffalo via Coursera
Supply Chain and Operations Management Tips
LinkedIn Learning
Kubernetes Security: Implementing Supply Chain Security
Pluralsight
Implement Cybersecurity Best Practices in Your Organization
Salesforce via Trailhead
ISC2 Certified Secure Software Life-Cycle Professional (CSSLP)
Cybrary