Multi-vocal Literature Review (Kubernetes Challenges)
16
Multi-vocal Literature Review (Current Kubernetes Research)
17
Security Defects in Kubernetes Manifests
18
Kubernetes Security Best Practices
19
Threat Model for misconfigured RBAC
20
Attacks for Misconfigured RBAC
21
Threat Model for misconfigured Pod
22
Attack for misconfigured pod
23
Attack in the Default Namespace
24
Threat Model for Network Policy
25
Possible Attacks for Undefined Network Policy
26
Threat Model for ETCD secret
27
Attack for Unencrypted ETCD
28
Threat Model for Resource Limit
29
Attacks for Resource Limit
30
Conclusion and Future Work
31
Summary
32
Questions
Description:
Explore the security vulnerabilities in Kubernetes clusters resulting from violations of best practices in this 41-minute conference talk by Md Shazibul Islam Shamim from Tennessee Tech. Gain insights into the evolution of application deployment, containerization, and the importance of container orchestration. Delve into Kubernetes architecture, usage, benefits, and the growing developer community. Examine practitioners' security concerns, potential attacks, and findings from multi-vocal literature reviews on Kubernetes challenges and current research. Learn about security defects in Kubernetes manifests, best practices, and threat models for misconfigured RBAC, pods, network policies, ETCD secrets, and resource limits. Understand the associated attacks and their implications. Conclude with a summary of key points and future research directions in Kubernetes security.
Security Attacks in Kubernetes Cluster Due to Security Best Practices Violation