Kubernetes Security: Attacking and Defending K8s Clusters

  Рет қаралды 5,320

SANS Cloud Security

SANS Cloud Security

Күн бұрын

This presentation aims to talk about different attack scenarios leveraging Kubernetes clusters. We'll dig deeper into a real-world attack scenario using real-world applications to demonstrate different ways attackers and malicious users can use to exploit your cluster and the applications running on it. But first, we’ll give an overview about Kubernetes and its architecture, covering the main components from the Control Plane and the Worker Nodes. Then, we'll use the K8s Threat Matrix and the MITRE ATT&CK for Containers published this year to discuss the Tactics, Techniques and Procedures to demonstrate the Recon, Exploitation and Post-Exploitation phases. After that, we'll provide some best practices to securing your cluster based on the scenarios and the CIS Benchmarks for Kubernetes. We'll show how to use Role-based access control (RBAC) for Access Control, to enable audit logs for security and troubleshooting, and we'll set up some network policies to avoid communication between pods and prevent any lateral movement from attackers.
About the Speaker
Magno Logan @magnologan, Information Security Specialist, Trend Micro
Magno Logan works as an Information Security Specialist for Trend Micro. He specializes in Cloud, Container and Application Security Research, Threat Modelling and Red Teaming. He has been tapped as a resource speaker for numerous security conferences around the globe. He is also a member of the CNCF SIG-Security team.
SANS Institute Summits at www.sans.org/cyber-security-s... SANS Cloud Security Curriculum, www.sans.org/cloud-security/ SANS Cloud Security on Twitter: @SANSCloudSec
SANS Cloud Security on LinkedIn: / sanscloudsec

Пікірлер: 3
@abdoelrahmanhegazy
@abdoelrahmanhegazy 2 жыл бұрын
Great talk Magno, Can you guys share the slides if they are public ? Thanks
@SANSCloudSecurity
@SANSCloudSecurity 2 жыл бұрын
Hi Abdel, you can get the slides if you create / login to your sans.org portal account.
@AbhayAR
@AbhayAR Жыл бұрын
Can you show me the path how to get this slides
Using the Cloud to Improve AppSec
28:18
SANS Cloud Security
Рет қаралды 237
Kubernetes Hacking: From Weak Applications to Cluster Control
36:22
Nutella bro sis family Challenge 😋
00:31
Mr. Clabik
Рет қаралды 13 МЛН
Каха и суп
00:39
К-Media
Рет қаралды 5 МЛН
KINDNESS ALWAYS COME BACK
00:59
dednahype
Рет қаралды 152 МЛН
Best father #shorts by Secret Vlog
00:18
Secret Vlog
Рет қаралды 22 МЛН
Certifik8s: All You Need to Know About Certificates in Kubernetes [I] - Alexander Brand, Apprenda
35:57
CNCF [Cloud Native Computing Foundation]
Рет қаралды 44 М.
Hacking and Hardening Kubernetes Clusters by Example [I] - Brad Geesaman, Symantec
39:31
CNCF [Cloud Native Computing Foundation]
Рет қаралды 41 М.
Kubernetes Security Best Practices - Ian Lewis, Google
28:53
CNCF [Cloud Native Computing Foundation]
Рет қаралды 49 М.
Kubernetes Security Best Practices 2021 (From Container Specialist)
17:01
Securing Kubernetes Secrets (Cloud Next '19)
42:27
Google Cloud Tech
Рет қаралды 19 М.
Tutorial: Hands-on Hacking Kubernetes and Ways to Prevent It - Eric Smalling, Snyk
1:13:23
CNCF [Cloud Native Computing Foundation]
Рет қаралды 3,4 М.
Kubernetes Security: Solving Common Challenges
12:49
HashiCorp
Рет қаралды 6 М.
Как правильно выключать звук на телефоне?
0:17
Люди.Идеи, общественная организация
Рет қаралды 1,5 МЛН
OZON РАЗБИЛИ 3 КОМПЬЮТЕРА
0:57
Кинг Комп Shorts
Рет қаралды 1,8 МЛН