Prevent Embarrassing Cluster Takeovers - Detecting and Mitigating Configuration Risks
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to protect your Kubernetes clusters from unauthorized access and data breaches in this informative conference talk. Discover common misconfigurations and security vulnerabilities that malicious actors can exploit without using sophisticated attacks or zero-day vulnerabilities. Explore Kubeaudit, an open-source scanner developed by Shopify, which offers a user-friendly approach to detecting and automatically mitigating configuration risks. Gain insights into the challenges of securing large-scale Kubernetes deployments, including 1,000,000 running pods and configuration files across 15,000 GitHub repositories. Acquire practical knowledge on identifying and resolving security issues without requiring expert-level expertise, while maintaining a positive developer experience. Walk away with valuable strategies to enhance your cluster security and prevent potential embarrassing takeovers.
Syllabus
Prevent Embarrassing Cluster Takeovers with This One Simple Trick! - Daniele Santos & Shane Lawrence
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Cloud Security Risks: Identify and Protect Against ThreatsGoogle Cloud via Coursera Kubernetes and Cloud Native Security Associate (KCSA) Cert Prep
LinkedIn Learning 12 Essential Requirements for Policy Enforcement and Governance with OSCAL
CNCF [Cloud Native Computing Foundation] via YouTube Running at Light Speed - Cloud Native Security Patterns
LASCON via YouTube A 10-Step Guide for Integrating Security Metrics Into Your Observability Stack
CNCF [Cloud Native Computing Foundation] via YouTube