Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore insights into unsecured Kubernetes clusters in the wild through this conference talk. Discover the findings of Jay Chen and Aviv Sasson from Palo Alto Networks, who uncovered 2,100 unsecured Kubernetes clusters comprising 5,300 nodes, 31,340 CPUs, and 75,270 pods on the internet. Learn about the sensitive data leaks, including access credentials, source code, and PII, from these clusters. Gain knowledge about the honeypot infrastructure used to collect and monitor malicious activities targeting Kubernetes environments. Understand the first malware that exploited Kubelets to compromise Kubernetes, its sophisticated evasion tactics, credential harvesting, lateral movement, and cryptojacking operations. Delve into topics such as Graboid, research methods, reactive research, and best practices for protection. Explore layers of defense, community services, and ephemeral workload design to enhance Kubernetes security.