RBACdoors - How Cryptominers Exploit RBAC Misconfigurations
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore a detailed analysis of cryptomining attacks exploiting RBAC misconfigurations in Kubernetes clusters in this 34-minute conference talk by Greg Castle and Vinayak Goyal from Google. Dive into a real-world case study from March, examining how cluster owners accidentally granted privileged access through RBAC misconfiguration. Learn about the attackers' sophisticated techniques, including masquerading as Kubernetes system components and leveraging the certificates API to create powerful access. Discover prevention and detection strategies for such attacks, and gain insights into the prevalence of similar RBAC misconfigurations across the industry. Enhance your understanding of Kubernetes security and stay ahead of emerging threats in cloud-native environments.
Syllabus
RBACdoors: How Cryptominers Are Exploiting RBAC Misconfigs - Greg Castle & Vinayak Goyal, Google
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Windows Server 2016 Security FeaturesMicrosoft via edX Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera Threat Detection: Planning for a Secure Enterprise
Microsoft via edX Microsoft Professional Capstone : Cybersecurity
Microsoft via edX Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn