YoVDO

Three Surprising Kubernetes Networking Features and How to Defend Against Them

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Courses Network Security Courses Cluster Security Courses Linux Networking Courses Container Security Courses Attack Surface Analysis Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore three surprising Kubernetes networking "features" and learn how to defend against them in this 33-minute conference talk by James Cleverley-Prance from ControlPlane. Delve into the complexities hidden beneath Kubernetes' networking model abstractions and challenge perceived trust boundaries. Discover how unchecked issues can expand a cluster's attack surface. Gain insights on the external attack surface of Kubernetes nodes, methods for enumerating externally available cluster information, and techniques for exploiting Linux networking to access internal pods and services. Learn about the potential misuse of CNI configurations and how it can compromise cluster security. Walk away with a deeper understanding of these attack vectors, effective mitigation strategies, and pragmatic defenses to protect your Kubernetes clusters from potential compromises.

Syllabus

Three Surprising K8s Networking “Features” and How to Defend Against Them - James Cleverley-Prance


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Burp Suite - Basic Concepts for Web Pentesting
YouTube
Rawr - Rapid Assessment of Web Resources
YouTube
Analyzing & Breaking QNX Exploit Mitigations and PRNGs for Embedded Systems
Black Hat via YouTube
Fuzzing File System Implementations to Uncover Security Bugs
Hack In The Box Security Conference via YouTube
Building an AppSec Program from the Ground Up - An Honest Retrospective
LASCON via YouTube