Security Practices for Kubernetes Cluster Administrators - Redteam Views
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore Kubernetes cluster security from an attacker's perspective in this 35-minute conference talk by Zebin Zhou from Tencent. Gain insights into real-world attack scenarios on K8s clusters, including container escape techniques, bypassing Pod Security Policies, and lateral movement strategies. Learn how to build secure, multi-tenant, large-scale Kubernetes clusters and implement effective defense mechanisms. Discover Tencent's experience in securing multi-tenant Kubernetes environments, with practical examples of security risks and their solutions. Cover topics such as K8s security features, privileged container exploitation, node-to-cluster admin escalation, API gateway protection, and the limitations of PodSecurity Policies. Enhance your understanding of Kubernetes security to better protect containers and data in your clusters.
Syllabus
Intro
About Me
K8s Security Features
From the Office Network
Try Privileged Container
m... Node to Cluster Admin
Defend?
From the Production Network
Real World Case 2
Protect API Gateway Admin
PodSecurity Policy Is Not a Secret Security Policy
IPTABLES Still Work
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Maintaining Deployment Security in Microsoft AzurePluralsight Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning Securing Containers and Kubernetes Ecosystem
LinkedIn Learning Performing DevSecOps Automated Security Testing
Pluralsight