YoVDO

Perfect Storm - Taking the Helm of Kubernetes

Offered By: YouTube

Tags

Conference Talks Courses Kubernetes Courses Containers Courses Cloud Security Courses Threat Modeling Courses Container Security Courses

Course Description

Overview

Explore the security landscape of Kubernetes in this 43-minute conference talk from Derbycon 2018. Dive into container technology, Kubernetes architecture, and potential security vulnerabilities. Learn about attack surfaces, threat modeling, and discovery techniques specific to Kubernetes environments. Examine authentication mechanisms, container registry security, and static code analysis methods. Investigate postmount escapes and cloud security considerations. Gain valuable insights into securing Kubernetes deployments, with a comprehensive overview of key concepts and practical resources for further exploration.

Syllabus

Intro
Containers
Kubernetes
Security
Attack Service
Threat Model
Discovery
Authentication
Container Registry
Static Code Analysis
Postmount Escapes
Cloud Security
TLDR
Resources


Related Courses

Maintaining Deployment Security in Microsoft Azure
Pluralsight
Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning
Securing Containers and Kubernetes Ecosystem
LinkedIn Learning
Performing DevSecOps Automated Security Testing
Pluralsight