YoVDO

Prevent Embarrassing Cluster Takeovers - Detecting and Mitigating Configuration Risks

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Courses DevSecOps Courses Configuration Management Courses Cluster Security Courses Container Security Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to protect your Kubernetes clusters from unauthorized access and data breaches in this informative conference talk. Discover common misconfigurations and security vulnerabilities that malicious actors can exploit without using sophisticated attacks or zero-day vulnerabilities. Explore Kubeaudit, an open-source scanner developed by Shopify, which offers a user-friendly approach to detecting and automatically mitigating configuration risks. Gain insights into the challenges of securing large-scale Kubernetes deployments, including 1,000,000 running pods and configuration files across 15,000 GitHub repositories. Acquire practical knowledge on identifying and resolving security issues without requiring expert-level expertise, while maintaining a positive developer experience. Walk away with valuable strategies to enhance your cluster security and prevent potential embarrassing takeovers.

Syllabus

Prevent Embarrassing Cluster Takeovers with This One Simple Trick! - Daniele Santos & Shane Lawrence


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Cloud Security Risks: Identify and Protect Against Threats
Google Cloud via Coursera
Kubernetes and Cloud Native Security Associate (KCSA) Cert Prep
LinkedIn Learning
12 Essential Requirements for Policy Enforcement and Governance with OSCAL
CNCF [Cloud Native Computing Foundation] via YouTube
Running at Light Speed - Cloud Native Security Patterns
LASCON via YouTube
A 10-Step Guide for Integrating Security Metrics Into Your Observability Stack
CNCF [Cloud Native Computing Foundation] via YouTube