
Is the container locked down? Security and compliance with Kubernetes
Kubernetes hacks: How attackers exploit misconfigured RBAC and secrets. Learn about scanning, logging, and hardening for secure operations.
Topic
Education and trainingIdentity and access managementNetwork Security / Patch ManagementTrend topic
When & Where
Details
Format:
Lecture
Language:
German
Session description
Kubernetes is powerful – but unfortunately, it's also a godsend for hackers. How do attackers gain access to secrets? What happens if Role-Based Access Control (RBAC) is misconfigured? And how quickly can a namespace become a gateway for the entire company?
qSkills Kubernetes expert Thorsten Schifferdecker shows you the risks lurking in real-life Kubernetes setups – and how easily common security and compliance regulations (CIS, ISO 27001, GDPR) can be circumvented.
Learn how to effectively protect yourself with scanning, logging, and hardening – and what modern incident management in a cluster looks like.
qSkills Kubernetes expert Thorsten Schifferdecker shows you the risks lurking in real-life Kubernetes setups – and how easily common security and compliance regulations (CIS, ISO 27001, GDPR) can be circumvented.
Learn how to effectively protect yourself with scanning, logging, and hardening – and what modern incident management in a cluster looks like.
Sponsored by