YoVDO

Security Attacks in Kubernetes Cluster Due to Security Best Practices Violation

Offered By: CAE in Cybersecurity Community via YouTube

Tags

Kubernetes Security Courses Container Orchestration Courses

Course Description

Overview

Explore the security vulnerabilities in Kubernetes clusters resulting from violations of best practices in this 41-minute conference talk by Md Shazibul Islam Shamim from Tennessee Tech. Gain insights into the evolution of application deployment, containerization, and the importance of container orchestration. Delve into Kubernetes architecture, usage, benefits, and the growing developer community. Examine practitioners' security concerns, potential attacks, and findings from multi-vocal literature reviews on Kubernetes challenges and current research. Learn about security defects in Kubernetes manifests, best practices, and threat models for misconfigured RBAC, pods, network policies, ETCD secrets, and resource limits. Understand the associated attacks and their implications. Conclude with a summary of key points and future research directions in Kubernetes security.

Syllabus

Intro
Overview of application Infrastructure
Development and Operations
Virtualized Deployment
Containerized Deployment
Evolution of Application Deployment
Why Container Orchestration?
What is Kubernetes
Kubernetes Architecture
Kubernetes Usage and Benefits
Kubernetes Developer Community
Practitioners Security Concerns in Kubernetes
Security Attacks in Kubernetes Cluster
Multi-vocal Literature Review of Kubernetes
Multi-vocal Literature Review (Kubernetes Challenges)
Multi-vocal Literature Review (Current Kubernetes Research)
Security Defects in Kubernetes Manifests
Kubernetes Security Best Practices
Threat Model for misconfigured RBAC
Attacks for Misconfigured RBAC
Threat Model for misconfigured Pod
Attack for misconfigured pod
Attack in the Default Namespace
Threat Model for Network Policy
Possible Attacks for Undefined Network Policy
Threat Model for ETCD secret
Attack for Unencrypted ETCD
Threat Model for Resource Limit
Attacks for Resource Limit
Conclusion and Future Work
Summary
Questions


Taught by

CAE in Cybersecurity Community

Related Courses

Security Best Practices in Google Cloud
Google Cloud via Coursera
Architecting with Google Kubernetes Engine: Production en Français
Google Cloud via Coursera
Configuring and Managing Kubernetes Security
Pluralsight
Security Best Practices in Google Cloud
Pluralsight
Kubernetes Security: Cluster Hardening
Pluralsight