Perfect Storm - Taking the Helm of Kubernetes
Offered By: YouTube
Course Description
Overview
Explore the security landscape of Kubernetes in this 43-minute conference talk from Derbycon 2018. Dive into container technology, Kubernetes architecture, and potential security vulnerabilities. Learn about attack surfaces, threat modeling, and discovery techniques specific to Kubernetes environments. Examine authentication mechanisms, container registry security, and static code analysis methods. Investigate postmount escapes and cloud security considerations. Gain valuable insights into securing Kubernetes deployments, with a comprehensive overview of key concepts and practical resources for further exploration.
Syllabus
Intro
Containers
Kubernetes
Security
Attack Service
Threat Model
Discovery
Authentication
Container Registry
Static Code Analysis
Postmount Escapes
Cloud Security
TLDR
Resources
Related Courses
Maintaining Deployment Security in Microsoft AzurePluralsight Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning Securing Containers and Kubernetes Ecosystem
LinkedIn Learning Performing DevSecOps Automated Security Testing
Pluralsight