Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Minimizing Blast Radius of Chained Kubernetes Misconfigurations and Image Vulnerabilities

Linux Foundation via YouTube

Overview

Explore strategies for minimizing the blast radius of chained Kubernetes misconfigurations and image vulnerabilities in this Linux Foundation live webinar. Delve into the persona of a developer, witness a small demo, and examine default Helm chart security. Investigate Helm chart misconfigs, Kubernetes policies, and the balance between security and usability. Learn about valid Kubernetes practices, public health charts, and implementing a Kubernetes checkoff process. Discover how to leverage GitHub Actions for security, address common problems in cloud security, and analyze the Unit42 Cloud Threat Report. Examine misconfiguration and public website examples, and gain insights into using Helm scanners. Explore wildcard roles, deployment roles, and other crucial considerations. Receive valuable advice on enhancing Kubernetes security to protect your containerized applications and infrastructure.

Syllabus

Introduction
Persona of a Developer
Small Demo
Default Helm Chart Security
Helm Chart Misconfigs
Kubernetes Policies
Security vs Usability
Valid Kubernetes
Public Health Charts
Kubernetes Checkoff
GitHub Action
Problem 1 Where to Start
Problem 2 Security Isnt a Point of Time
Unit42 Cloud Threat Report
Misconfiguration Example
Public Website Example
How to Get Diagrams
Helm Scanner
Wildcard Roles
Deployment Roles
Other Considerations
Advice
Security

Taught by

Linux Foundation

Reviews

Start your review of Minimizing Blast Radius of Chained Kubernetes Misconfigurations and Image Vulnerabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.