Overview
Syllabus
Introduction
Our systems are constantly under attack
Hackers can steal AWS credentials
Top secret doesnt work
Premise
Bens background
Cutter Coder
QA
Kubernetes
Kubernetes Architecture
Kubernetes Loop
Applying Security
Rolebased access control
Rolebased security
API secrets
Pods
Privilege Escalation
Defaults
Privileged Containers
Kubernetes Page Limit
Remove Additional Capabilities
Lineage Capabilities
Allow Privilege Escalation
Installer Settings
System Anonymous
Security Permissions
Demon Sets
Network Policies
Be Secure by Default
Kubernetes Tools
Control Plane
Open Policy Agent
Mobility
AppArmor
CPU Bug
Upgrade Communities
What should we be doing
How to learn more
Taught by
NDC Conferences