YoVDO

Introducing the OWASP Top Ten for Kubernetes

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Supply Chain Security Courses RBAC Courses Container Security Courses Network Segmentation Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the OWASP Top Ten for Kubernetes in this informative 22-minute conference talk by Jimmy Mesta from KSOC Labs, Inc. Gain insights into the most common Kubernetes risks identified by the Open Web Application Security Project (OWASP) community. Learn about insecure workload configurations, supply chain vulnerabilities, overly permissive RBAC settings, and the importance of centralized policy enforcement. Discover the challenges of broken authentication mechanisms, missing network segmentation controls, and misconfigured cluster components. Understand the risks associated with outdated and vulnerable Kubernetes components. Get involved in this open-source project and enhance your knowledge of containerized infrastructure security. Perfect for developers, security professionals, and Kubernetes enthusiasts looking to improve their understanding of cloud-native security practices.

Syllabus

Intro
Insecure Workload Configurations
Supply Chain Vulnerabilities
Overly Permissive RBAC Configurations
Lack of Centralized Policy Enforcement
Broken Authentication Mechanisms
Missing Network Segmentation Controls
Misconfigured Cluster Components
Outdated and Vulnerable Kubernetes Components


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Security Best Practices in Google Cloud
Google Cloud via Coursera
Architecting with Google Kubernetes Engine: Production en Français
Google Cloud via Coursera
Configuring and Managing Kubernetes Security
Pluralsight
Security Best Practices in Google Cloud
Pluralsight
Kubernetes Security: Cluster Hardening
Pluralsight