Kubernetes to Cloud Attack Vectors: Demos of Cross-Environment Vulnerabilities
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore the intricate relationship between managed Kubernetes clusters and cloud environments in this 37-minute conference talk. Discover potential attack vectors and lateral movement paths that arise from integrating cloud-specific capabilities within managed Kubernetes services. Through live demonstrations, learn how attackers can exploit vulnerabilities to move from Kubernetes clusters to cloud resources and vice versa. Gain valuable insights into best practices for securing EKS, AKS, and GKE configurations to prevent cluster-to-cloud and cloud-to-cluster attacks. Enhance your understanding of the security implications in the evolving landscape of cloud-native technologies.
Syllabus
Kubernetes to Cloud Attack Vectors: Demos Inside - Danny Hershko Shemesh & Alon Schindel, Wiz
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Building on Microsoft Sentinel PlatformMicrosoft via YouTube Securing Applications and Infrastructure on Kubernetes with Sysdig
Mirantis via YouTube Container Escape in 2021
Hack In The Box Security Conference via YouTube Running at Light Speed - Cloud Native Security Patterns
LASCON via YouTube Controlled Mayhem With Cloud Native Security Pipelines
OWASP Foundation via YouTube