YoVDO

RBACdoors - How Cryptominers Exploit RBAC Misconfigurations

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Access Control Courses Threat Detection Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a detailed analysis of cryptomining attacks exploiting RBAC misconfigurations in Kubernetes clusters in this 34-minute conference talk by Greg Castle and Vinayak Goyal from Google. Dive into a real-world case study from March, examining how cluster owners accidentally granted privileged access through RBAC misconfiguration. Learn about the attackers' sophisticated techniques, including masquerading as Kubernetes system components and leveraging the certificates API to create powerful access. Discover prevention and detection strategies for such attacks, and gain insights into the prevalence of similar RBAC misconfigurations across the industry. Enhance your understanding of Kubernetes security and stay ahead of emerging threats in cloud-native environments.

Syllabus

RBACdoors: How Cryptominers Are Exploiting RBAC Misconfigs - Greg Castle & Vinayak Goyal, Google


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Computing, Storage and Security with Google Cloud Platform
Google via Coursera