Prevent Embarrassing Cluster Takeovers - Detecting and Mitigating Configuration Risks
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Learn how to protect your Kubernetes clusters from unauthorized access and data breaches in this informative conference talk. Discover common misconfigurations and security vulnerabilities that malicious actors can exploit without using sophisticated attacks or zero-day vulnerabilities. Explore Kubeaudit, an open-source scanner developed by Shopify, which offers a user-friendly approach to detecting and automatically mitigating configuration risks. Gain insights into the challenges of securing large-scale Kubernetes deployments, including 1,000,000 running pods and configuration files across 15,000 GitHub repositories. Acquire practical knowledge on identifying and resolving security issues without requiring expert-level expertise, while maintaining a positive developer experience. Walk away with valuable strategies to enhance your cluster security and prevent potential embarrassing takeovers.
Syllabus
Prevent Embarrassing Cluster Takeovers with This One Simple Trick! - Daniele Santos & Shane Lawrence
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Introduction to Cloud Infrastructure TechnologiesLinux Foundation via edX Scalable Microservices with Kubernetes
Google via Udacity Google Cloud Fundamentals: Core Infrastructure
Google via Coursera Introduction to Kubernetes
Linux Foundation via edX Fundamentals of Containers, Kubernetes, and Red Hat OpenShift
Red Hat via edX