Overview
Syllabus
Introduction
About Andrew
Why does this matter
Why not security
Everything is fine
Cuban actors
Agenda
Kubernetes is insecure
A back model
workload security
misconfigurations
deployment configuration tool
dashboard
cluster
security again
what Kubernetes looks like
bootstrap TLS nodes
back role access control
Legacy Authorization
Secure Port
Leaking Secrets
Certificate rotation
Pods
Table Security Policies
Resource linting
Deployments
Labels
Containers
Admission Controllers
Limit Ranger
Security Policy
Encryption
Sealed Secrets
Token Requests
Networking
Network Policy
Service Mesh
Deployment Strategies
Recap
Multiple Clusters
Container Runtimes
Taught by
OWASP Foundation