YoVDO

Using k8s to Deploy Security Services in a Hostile World

Offered By: nullcon via YouTube

Tags

nullcon Courses Kubernetes Courses Cloud Security Courses Containerization Courses

Course Description

Overview

Explore how to leverage Kubernetes for deploying security services in challenging environments in this 16-minute conference talk from the Nullcon International Security Conference March 2021. Learn from Google Security Engineer John Nichols as he shares insights on inheriting complex projects and building scalable tooling solutions. Discover a three-step plan for deploying containerized security tools into "hostile" environments with minimal customization. Gain valuable knowledge about cloud setup processes, cron job implementation, and overcoming deployment obstacles. Understand the current state of this project and its potential applications in cloud security and Kubernetes ecosystems.

Syllabus

Intro
Administrative notes!
My three step plan
Services I started with
Cloud setup process
The cron process
This was actually really hard
Where is this project now?


Taught by

nullcon

Related Courses

Unearthing Malicious and Risky OpenSource Packages Using Packj
nullcon via YouTube
Pushing Security Left by Mutating Byte Code
nullcon via YouTube
The Faces of MacOS Malware - Detecting Anomalies in a Poisoned Apple
nullcon via YouTube
Contextomy - Let's Debug Together
nullcon via YouTube
Mind The Gap - The Linux Ecosystem Kernel Patch Gap
nullcon via YouTube