YoVDO

Living off the Land Techniques in Managed Kubernetes Clusters

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Courses Cloud Security Courses Threat Detection Courses Lateral Movement Courses RBAC Courses Webhooks Courses Fluent Bit Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore Living off the Land (LotL) techniques in managed Kubernetes clusters through this informative conference talk. Delve into the compromises and security challenges introduced by managed Kubernetes services, focusing on CSP-specific cluster middleware that expands the attack surface. Learn about a series of LotL techniques that exploit middleware functionality to elevate RBAC privileges, move laterally, bypass security controls, and evade detection. Discover examples such as abusing fluent-bit for PI exfiltration, achieving cluster admin via obscure system node-problem-detector host services, and leveraging webhooks for persistency. Gain insights into the taxonomy of these techniques, their relation to CISA guidance, and their mapping onto the Kubernetes threat matrix. Understand the implications for security teams and the difficulties in distinguishing between legitimate component behavior and malicious activities in managed Kubernetes environments.

Syllabus

Living off the Land Techniques in Managed Kubernetes Clusters - Ronen Shustin & Shay Berkovich


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Windows Server 2016 Security Features
Microsoft via edX
Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Microsoft Professional Capstone : Cybersecurity
Microsoft via edX
Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn