Jump to content

Live Hack: Hack My Mis-Configured Kubernetes

James
DevOps Events

Join Us for a Complimentary Live Webinar Sponsored by Snyk

  • Date: Wednesday, November 4, 2020
  • Time: 9:00 – 9:50 am PST
  • Cost: Free

Abstract
In the last few years, we’ve seen more and more responsibilities shift left – to development teams. With the widespread adoption of Kubernetes, we’re now seeing configurations become a developer issue first and foremost. This responsibility means that developers need to be aware of the security risks involved in their configurations.

Just by themselves, those configuration security risks might not be so harmful. But with other vulnerable components in the production environment, like the libraries used in the application, or a malicious container, potential attackers can build a multi-steps attack vector, using all of these risks together. As developers, we should give the necessary attention to those risks, and make sure that our applications and clusters are as secure as possible.

In this live hacking presentation, we demonstrate some of the key security issues that affect your Kubernetes configuration, including:

SecurityContext pitfalls like Privileged pods
Running pods without resource limitations
We explain what they actually mean, what an attacker can do to your cluster, and how you can fix them.

This webinar is sponsored by Snyk and hosted by The Linux Foundation.

Full Details & Registration

image.thumb.png.2e09760255f24e6230699939a606785e.png


Recommended Comments

There are no comments to display.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Add a comment...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...