YoVDO

Introducing the OWASP Top Ten for Kubernetes

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Supply Chain Security Courses RBAC Courses Container Security Courses Network Segmentation Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the OWASP Top Ten for Kubernetes in this informative 22-minute conference talk by Jimmy Mesta from KSOC Labs, Inc. Gain insights into the most common Kubernetes risks identified by the Open Web Application Security Project (OWASP) community. Learn about insecure workload configurations, supply chain vulnerabilities, overly permissive RBAC settings, and the importance of centralized policy enforcement. Discover the challenges of broken authentication mechanisms, missing network segmentation controls, and misconfigured cluster components. Understand the risks associated with outdated and vulnerable Kubernetes components. Get involved in this open-source project and enhance your knowledge of containerized infrastructure security. Perfect for developers, security professionals, and Kubernetes enthusiasts looking to improve their understanding of cloud-native security practices.

Syllabus

Intro
Insecure Workload Configurations
Supply Chain Vulnerabilities
Overly Permissive RBAC Configurations
Lack of Centralized Policy Enforcement
Broken Authentication Mechanisms
Missing Network Segmentation Controls
Misconfigured Cluster Components
Outdated and Vulnerable Kubernetes Components


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Microsoft Azure Developer: Implement User Authentication and Authorization
Pluralsight
Building Authorization in Azure Active Directory for Developers
Pluralsight
Configuring Virtual Machines in Microsoft Azure
Pluralsight
Microsoft Azure Security Engineer: Configure Secure Access Using Azure AD
Pluralsight
Managing and Monitoring Access on AWS
Pluralsight