YoVDO

Hacking Istio: The Good, the Bad, and the Misconfigured

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Istio Courses Cybersecurity Courses Network Security Courses Kubernetes Courses Penetration Testing Courses Access Control Courses Service Mesh Courses Mutual TLS Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Istio security in this hands-on tutorial focused on identifying and exploiting vulnerabilities caused by misconfigurations. Dive into the world of network security tools provided by Istio, including mutual TLS encryption and AuthorizationPolicies for access control. Gain practical experience with pre-configured Kubernetes clusters featuring Istio installations and intentional vulnerabilities. Begin with an introduction to Istio before engaging in a collaborative, beginner-friendly exercise to find and exploit Istio misconfigurations. Receive guidance and hints as needed while working towards uncovering a hidden flag within the cluster. Learn about the new Ambient mode in Istio and its implications for configuring access control across different network layers. Conclude with a comprehensive walkthrough of the steps required to locate the concealed flag, reinforcing the critical importance of properly configuring Istio security policies and understanding the potential consequences of overlooked misconfigurations.

Syllabus

Tutorial: Hacking Istio: The Good, the Bad, and the Misconfigured - Nina Polshakova & Peter Jausovec


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Kubernetes: Service Mesh with Istio
LinkedIn Learning
Mutual TLS - The Backend Engineering Show
Hussein Nasser via YouTube
OAuth 2.1 and Beyond
NDC Conferences via YouTube
An Extensive Formal Security Analysis of the OpenID Financial Grade API
IEEE via YouTube
Achieving Mutual TLS - Secure Pod-to-Pod Communication Without the Hassle
USENIX via YouTube