Overview
Explore the OWASP Top Ten for Kubernetes in this informative 22-minute conference talk by Jimmy Mesta from KSOC Labs, Inc. Gain insights into the most common Kubernetes risks identified by the Open Web Application Security Project (OWASP) community. Learn about insecure workload configurations, supply chain vulnerabilities, overly permissive RBAC settings, and the importance of centralized policy enforcement. Discover the challenges of broken authentication mechanisms, missing network segmentation controls, and misconfigured cluster components. Understand the risks associated with outdated and vulnerable Kubernetes components. Get involved in this open-source project and enhance your knowledge of containerized infrastructure security. Perfect for developers, security professionals, and Kubernetes enthusiasts looking to improve their understanding of cloud-native security practices.
Syllabus
Intro
Insecure Workload Configurations
Supply Chain Vulnerabilities
Overly Permissive RBAC Configurations
Lack of Centralized Policy Enforcement
Broken Authentication Mechanisms
Missing Network Segmentation Controls
Misconfigured Cluster Components
Outdated and Vulnerable Kubernetes Components
Taught by
CNCF [Cloud Native Computing Foundation]