Главная
Study mode:
on
1
Intro
2
Insecure Workload Configurations
3
Supply Chain Vulnerabilities
4
Overly Permissive RBAC Configurations
5
Lack of Centralized Policy Enforcement
6
Broken Authentication Mechanisms
7
Missing Network Segmentation Controls
8
Misconfigured Cluster Components
9
Outdated and Vulnerable Kubernetes Components
Description:
Explore the OWASP Top Ten for Kubernetes in this informative 22-minute conference talk by Jimmy Mesta from KSOC Labs, Inc. Gain insights into the most common Kubernetes risks identified by the Open Web Application Security Project (OWASP) community. Learn about insecure workload configurations, supply chain vulnerabilities, overly permissive RBAC settings, and the importance of centralized policy enforcement. Discover the challenges of broken authentication mechanisms, missing network segmentation controls, and misconfigured cluster components. Understand the risks associated with outdated and vulnerable Kubernetes components. Get involved in this open-source project and enhance your knowledge of containerized infrastructure security. Perfect for developers, security professionals, and Kubernetes enthusiasts looking to improve their understanding of cloud-native security practices.

Introducing the OWASP Top Ten for Kubernetes

CNCF [Cloud Native Computing Foundation]
Add to list
0:00 / 0:00