YoVDO

The Insider Threat: Third-Party Applications in Your Cluster

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Vulnerability Assessment Courses Service Mesh Courses Cluster Security Courses Admission Controllers Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical security implications of third-party applications in Kubernetes clusters through this informative conference talk. Delve into real-world vulnerabilities commonly found in large Kubernetes deployments, understanding their discovery process and potential impact. Learn about the risks associated with popular additions like service meshes, CSI drivers, admission controllers, and database engines. Gain valuable insights into actionable steps for preventing third-party vulnerabilities from compromising cluster security. Discover how to balance the benefits of leveraging robust third-party solutions with the need for maintaining a secure Kubernetes environment.

Syllabus

The Insider Threat: Third-Party Applications In Your Cluster - Dagan Henderson & Will Kline


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Learning HashiCorp Consul
A Cloud Guru
Service Mesh with Istio
A Cloud Guru
Architecting Hybrid Cloud Infrastructure with Anthos
Google Cloud via Coursera
Architecting Hybrid Cloud Infrastructure with Anthos
Google Cloud via Coursera
Cloud Operations and Service Mesh with Anthos
Google Cloud via Coursera