
Hacking Kubernetes and protecting yourself against it
How can a tiny vulnerability in a web application result in your entire Kubernetes cluster and cloud provider account being taken over?
Topic
Cloud SecurityGovernance, Riskmanagement and ComplianceTrend topic
When & Where
Details
Format:
Lecture
Session description
How can a tiny vulnerability in a web application result in your entire Kubernetes cluster and cloud provider account being taken over? In this talk, we use a live system to show how a hacker could do exactly that.
You’ll learn about different attack vectors and how to protect against each one with a multi-layered security strategy. And all of this with the help of open-source tools like NeuVector and Kubewarden, which you can leverage off to protect your systems during Supply Chain and at Runtime.
Focus:
– Presentation of modern challenges in securing Kubernetes environments
– Penetrating an environment via known vulnerabilities
– Securing the environment from threats and attacks
You’ll learn about different attack vectors and how to protect against each one with a multi-layered security strategy. And all of this with the help of open-source tools like NeuVector and Kubewarden, which you can leverage off to protect your systems during Supply Chain and at Runtime.
Focus:
– Presentation of modern challenges in securing Kubernetes environments
– Penetrating an environment via known vulnerabilities
– Securing the environment from threats and attacks