Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Security Practices for Kubernetes Cluster Administrators - Redteam Views

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Explore Kubernetes cluster security from an attacker's perspective in this 35-minute conference talk by Zebin Zhou from Tencent. Gain insights into real-world attack scenarios on K8s clusters, including container escape techniques, bypassing Pod Security Policies, and lateral movement strategies. Learn how to build secure, multi-tenant, large-scale Kubernetes clusters and implement effective defense mechanisms. Discover Tencent's experience in securing multi-tenant Kubernetes environments, with practical examples of security risks and their solutions. Cover topics such as K8s security features, privileged container exploitation, node-to-cluster admin escalation, API gateway protection, and the limitations of PodSecurity Policies. Enhance your understanding of Kubernetes security to better protect containers and data in your clusters.

Syllabus

Intro
About Me
K8s Security Features
From the Office Network
Try Privileged Container
m... Node to Cluster Admin
Defend?
From the Production Network
Real World Case 2
Protect API Gateway Admin
PodSecurity Policy Is Not a Secret Security Policy
IPTABLES Still Work

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Security Practices for Kubernetes Cluster Administrators - Redteam Views

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.