YoVDO

The Insider Threat: Third-Party Applications in Your Cluster

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Vulnerability Assessment Courses Service Mesh Courses Cluster Security Courses Admission Controllers Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical security implications of third-party applications in Kubernetes clusters through this informative conference talk. Delve into real-world vulnerabilities commonly found in large Kubernetes deployments, understanding their discovery process and potential impact. Learn about the risks associated with popular additions like service meshes, CSI drivers, admission controllers, and database engines. Gain valuable insights into actionable steps for preventing third-party vulnerabilities from compromising cluster security. Discover how to balance the benefits of leveraging robust third-party solutions with the need for maintaining a secure Kubernetes environment.

Syllabus

The Insider Threat: Third-Party Applications In Your Cluster - Dagan Henderson & Will Kline


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Security Best Practices in Google Cloud
Google Cloud via Coursera
Architecting with Google Kubernetes Engine: Production en Français
Google Cloud via Coursera
Configuring and Managing Kubernetes Security
Pluralsight
Security Best Practices in Google Cloud
Pluralsight
Kubernetes Security: Cluster Hardening
Pluralsight