Kubernetes Security Anatomy and the Recently Disclosed CVEs
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore a comprehensive analysis of Kubernetes security, focusing on recent CVE disclosures and their implications in this 47-minute webinar presented by Gadi Naor, CTO & Co-Founder of Alcide. Delve into a holistic approach to Kubernetes security, covering workload protection, trust boundaries, and security posture. Learn how to detect and prevent exploits related to control plane vulnerabilities and network security issues. Gain insights into scanning environments, understanding the "Men in the Middle" concept, and the localhost trust boundary vulnerability. Examine the disclosure timeline, real-world impact, and the role of Kubernetes Audit Logs in security. Conclude with a Q&A session to address specific concerns and deepen your understanding of Kubernetes security best practices.
Syllabus
Introduction
Overview
Workload Security
Trust Boundaries
Security Posture
Scanning your environment
Men in the Middle
Prerequisites
localhost trust boundary vulnerability
Disclosure timeline
What really happened
Kubernetes Audit Log
Example
QA
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Security Best Practices in Google CloudGoogle Cloud via Coursera Architecting with Google Kubernetes Engine: Production en Français
Google Cloud via Coursera Configuring and Managing Kubernetes Security
Pluralsight Security Best Practices in Google Cloud
Pluralsight Kubernetes Security: Cluster Hardening
Pluralsight