Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Security Attacks in Kubernetes Cluster Due to Security Best Practices Violation

CAE in Cybersecurity Community via YouTube

Overview

Explore the security vulnerabilities in Kubernetes clusters resulting from violations of best practices in this 41-minute conference talk by Md Shazibul Islam Shamim from Tennessee Tech. Gain insights into the evolution of application deployment, containerization, and the importance of container orchestration. Delve into Kubernetes architecture, usage, benefits, and the growing developer community. Examine practitioners' security concerns, potential attacks, and findings from multi-vocal literature reviews on Kubernetes challenges and current research. Learn about security defects in Kubernetes manifests, best practices, and threat models for misconfigured RBAC, pods, network policies, ETCD secrets, and resource limits. Understand the associated attacks and their implications. Conclude with a summary of key points and future research directions in Kubernetes security.

Syllabus

Intro
Overview of application Infrastructure
Development and Operations
Virtualized Deployment
Containerized Deployment
Evolution of Application Deployment
Why Container Orchestration?
What is Kubernetes
Kubernetes Architecture
Kubernetes Usage and Benefits
Kubernetes Developer Community
Practitioners Security Concerns in Kubernetes
Security Attacks in Kubernetes Cluster
Multi-vocal Literature Review of Kubernetes
Multi-vocal Literature Review (Kubernetes Challenges)
Multi-vocal Literature Review (Current Kubernetes Research)
Security Defects in Kubernetes Manifests
Kubernetes Security Best Practices
Threat Model for misconfigured RBAC
Attacks for Misconfigured RBAC
Threat Model for misconfigured Pod
Attack for misconfigured pod
Attack in the Default Namespace
Threat Model for Network Policy
Possible Attacks for Undefined Network Policy
Threat Model for ETCD secret
Attack for Unencrypted ETCD
Threat Model for Resource Limit
Attacks for Resource Limit
Conclusion and Future Work
Summary
Questions

Taught by

CAE in Cybersecurity Community

Reviews

Start your review of Security Attacks in Kubernetes Cluster Due to Security Best Practices Violation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.