Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Common Kubernetes Attack Vectors and How to Secure Your Cluster

LF Networking via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about critical Kubernetes security measures in this technical presentation that explores common attack vectors and defensive strategies. Discover the major components of Kubernetes deployments while gaining practical knowledge about securing them against various threats including supply chain risks, malicious actors, insider threats, and misconfigurations. Master essential security concepts including pod security, network separation, authentication and authorization mechanisms, audit logging implementation, and threat detection techniques. Explore detailed approaches for monitoring Kubernetes deployments, implementing proper networking policies, managing user authentication, securing compute resources, protecting the control plane, configuring audit policies, hardening worker nodes and pods, and establishing effective log aggregation practices. Gain valuable insights from Department of Defense security experts on detecting and preventing attacks that commonly exploit misconfigured networking policies, authentication systems, authorization controls, and outdated software components.

Syllabus

Introduction
Kubernetes Components
User Authentication
Networking Policies
Secure Compute
Control Plane
Audit Policy
Worker Nodes
Pods
aggregate your logs

Taught by

LF Networking

Reviews

Start your review of Common Kubernetes Attack Vectors and How to Secure Your Cluster

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.