Главная
Study mode:
on
1
Introduction
2
Questions
3
Kubernetes
4
Kubernetes Architecture
5
Cloud Native Computing Foundation
6
Additional Features
7
Everyone Needs to Level Up
8
Kubernetes is a Fastpaced Project
9
Kubernetes Versions
10
The Landscape
11
Attacker Mindset
12
Demo
13
Validating Webhook
14
Custom Webhooks
15
Demo Validating Webhooks
16
Managing Kubernetes Providers
17
StackDriver
18
StackDriver Example
19
The Real API Server
20
What is K3S
21
How to use K3S
22
Demonstration
23
Upcoming Kubernetes Features
24
Couplet Exploit
25
Demo of Exploit
26
Review Audit Logs
27
Secure Kubernetes
28
Resources
Description:
Explore advanced persistence threats and sophisticated attacks on Kubernetes in this 47-minute RSA Conference talk. Delve into the potential capabilities of attackers with deep Kubernetes knowledge as Ian Coldwater and Brad Geesaman uncover new advanced attack techniques. Learn practical methods for detecting and preventing these threats, examining dark corners of clusters and shedding light on emerging security challenges. Gain insights into Kubernetes architecture, cloud-native computing, and the evolving landscape of container security. Witness demonstrations of validating webhooks, K3S usage, and exploit techniques. Understand the importance of audit logs and discover resources for securing Kubernetes environments. Suitable for those familiar with Linux, networking fundamentals, containers, and Kubernetes basics.

Advanced Persistence Threats - The Future of Kubernetes Attacks

RSA Conference
Add to list
0:00 / 0:00