Overview
Explore strategies for minimizing the blast radius of chained Kubernetes misconfigurations and image vulnerabilities in this Linux Foundation live webinar. Delve into the persona of a developer, witness a small demo, and examine default Helm chart security. Investigate Helm chart misconfigs, Kubernetes policies, and the balance between security and usability. Learn about valid Kubernetes practices, public health charts, and implementing a Kubernetes checkoff process. Discover how to leverage GitHub Actions for security, address common problems in cloud security, and analyze the Unit42 Cloud Threat Report. Examine misconfiguration and public website examples, and gain insights into using Helm scanners. Explore wildcard roles, deployment roles, and other crucial considerations. Receive valuable advice on enhancing Kubernetes security to protect your containerized applications and infrastructure.
Syllabus
Introduction
Persona of a Developer
Small Demo
Default Helm Chart Security
Helm Chart Misconfigs
Kubernetes Policies
Security vs Usability
Valid Kubernetes
Public Health Charts
Kubernetes Checkoff
GitHub Action
Problem 1 Where to Start
Problem 2 Security Isnt a Point of Time
Unit42 Cloud Threat Report
Misconfiguration Example
Public Website Example
How to Get Diagrams
Helm Scanner
Wildcard Roles
Deployment Roles
Other Considerations
Advice
Security
Taught by
Linux Foundation