YoVDO

Kubernetes Initial Access Vectors: Security Risks and Mitigations

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Cluster Management Courses Threat Detection Courses Vulnerability Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical aspects of securing initial access to Kubernetes clusters in this informative conference talk. Delve into the various methods malicious actors can employ to gain unauthorized access, including API server and data plane access, management interfaces, anonymous access, and image poisoning. Gain clarity on the complex landscape of authentication methods across different managed services. Examine each initial access vector, understanding prerequisites such as misconfigurations and vulnerabilities, compromised role permissions and their impact, as well as effective mitigation strategies. Connect these vectors to real-world attacks observed recently and witness demonstrations of the most intriguing scenarios. Learn how access events manifest in cloud and audit logs, as well as kernel-level visibility, equipping yourself with a comprehensive detection strategy. Leave with a deeper understanding of Kubernetes security and practical insights to enhance your cluster's protection against initial access threats.

Syllabus

Why Barricade the Door if the Window Is Open? Making Sense of Kubernetes Initial Access Vectors


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Windows Server 2016 Security Features
Microsoft via edX
Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Microsoft Professional Capstone : Cybersecurity
Microsoft via edX
Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn