YoVDO

Hack My Mis-Configured Kubernetes: Security Vulnerabilities and Best Practices

Offered By: Linux Foundation via YouTube

Tags

Kubernetes Courses DevOps Courses Privilege Escalation Courses Vulnerability Scanning Courses Container Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore common Kubernetes misconfigurations and security vulnerabilities in this 58-minute webinar sponsored by Snyk. Dive into topics such as configuration vulnerabilities, developer ownership, security contexts, and privileged pods. Learn about the importance of resource limitations, including CPU and memory throttling. Discover when root containers are necessary and how to implement "run as non-root" practices. Examine pod security policies, shifting security responsibilities, and methods for validating Kubernetes setups. Gain insights on balancing quality and quantity in security measures, and explore the differences between OKD and Kubernetes. Participate in live demonstrations and Q&A sessions covering privilege run modes, code injection, and memory limits. Enhance your Kubernetes security knowledge with practical examples and expert guidance on creating a secure infrastructure.

Syllabus

Intro
Configuration Vulnerability
Developer Ownership
Security Context
Privileged Pods
Demo
When do we need root containers
Run is nonroot
Resource limitations
CPU throttling
Memory throttling
Next demo
Conclusions
Recap
Conclusion
Secure base
Quality vs quantity
Sneak Infrastructure Demo
Questions
OKD vs Kubernetes
Privilege Run Mode
Code Injection
Privilege vs Root
Demo code
Memory limits
Sample apps
Architecture
Image Root Access
Pod Security Policies
Shifting Security Responsibility
Is it enough
Does a sneak container gathered scan
How to validate Kubernetes
Setting a memory limited model


Taught by

Linux Foundation

Tags

Related Courses

Maintaining Deployment Security in Microsoft Azure
Pluralsight
Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning
Securing Containers and Kubernetes Ecosystem
LinkedIn Learning
Performing DevSecOps Automated Security Testing
Pluralsight