YoVDO

The Insider Threat: Third-Party Applications in Your Cluster

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Vulnerability Assessment Courses Service Mesh Courses Cluster Security Courses Admission Controllers Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical security implications of third-party applications in Kubernetes clusters through this informative conference talk. Delve into real-world vulnerabilities commonly found in large Kubernetes deployments, understanding their discovery process and potential impact. Learn about the risks associated with popular additions like service meshes, CSI drivers, admission controllers, and database engines. Gain valuable insights into actionable steps for preventing third-party vulnerabilities from compromising cluster security. Discover how to balance the benefits of leveraging robust third-party solutions with the need for maintaining a secure Kubernetes environment.

Syllabus

The Insider Threat: Third-Party Applications In Your Cluster - Dagan Henderson & Will Kline


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Advanced Kubernetes: 1 Core Concepts
LinkedIn Learning
Checking Your --privileged Container
Security BSides San Francisco via YouTube
Writing a Kubernetes Controller - Tutorial
Rawkode Academy via YouTube
Kubernetes – Going Beyond the Basics
NDC Conferences via YouTube
Kubernetes - Going Beyond the Basics
NDC Conferences via YouTube