YoVDO

Kubernetes Security Anatomy and the Recently Disclosed CVEs

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of Kubernetes security, focusing on recent CVE disclosures and their implications in this 47-minute webinar presented by Gadi Naor, CTO & Co-Founder of Alcide. Delve into a holistic approach to Kubernetes security, covering workload protection, trust boundaries, and security posture. Learn how to detect and prevent exploits related to control plane vulnerabilities and network security issues. Gain insights into scanning environments, understanding the "Men in the Middle" concept, and the localhost trust boundary vulnerability. Examine the disclosure timeline, real-world impact, and the role of Kubernetes Audit Logs in security. Conclude with a Q&A session to address specific concerns and deepen your understanding of Kubernetes security best practices.

Syllabus

Introduction
Overview
Workload Security
Trust Boundaries
Security Posture
Scanning your environment
Men in the Middle
Prerequisites
localhost trust boundary vulnerability
Disclosure timeline
What really happened
Kubernetes Audit Log
Example
QA


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Security Best Practices in Google Cloud
Google Cloud via Coursera
Architecting with Google Kubernetes Engine: Production en Français
Google Cloud via Coursera
Configuring and Managing Kubernetes Security
Pluralsight
Security Best Practices in Google Cloud
Pluralsight
Kubernetes Security: Cluster Hardening
Pluralsight