Prevent Embarrassing Cluster Takeovers - Detecting and Mitigating Configuration Risks
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Learn how to protect your Kubernetes clusters from unauthorized access and data breaches in this informative conference talk. Discover common misconfigurations and security vulnerabilities that malicious actors can exploit without using sophisticated attacks or zero-day vulnerabilities. Explore Kubeaudit, an open-source scanner developed by Shopify, which offers a user-friendly approach to detecting and automatically mitigating configuration risks. Gain insights into the challenges of securing large-scale Kubernetes deployments, including 1,000,000 running pods and configuration files across 15,000 GitHub repositories. Acquire practical knowledge on identifying and resolving security issues without requiring expert-level expertise, while maintaining a positive developer experience. Walk away with valuable strategies to enhance your cluster security and prevent potential embarrassing takeovers.
Syllabus
Prevent Embarrassing Cluster Takeovers with This One Simple Trick! - Daniele Santos & Shane Lawrence
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
DevOps CI/CD Pipeline: Automation from development to deploymentUniversidad Anáhuac via edX DevOps Pipeline: Automatización hasta el despliegue
Universidad Anáhuac via edX Exploring the Benefits of Continuous Security and Compliance for Cloud Infrastructure
Pluralsight Integrating Incident Response into DevSecOps
Pluralsight DevSecOps: Building a Secure Continuous Delivery Pipeline
LinkedIn Learning