Главная
Study mode:
on
1
Introduction
2
Persona of a Developer
3
Small Demo
4
Default Helm Chart Security
5
Helm Chart Misconfigs
6
Kubernetes Policies
7
Security vs Usability
8
Valid Kubernetes
9
Public Health Charts
10
Kubernetes Checkoff
11
GitHub Action
12
Problem 1 Where to Start
13
Problem 2 Security Isnt a Point of Time
14
Unit42 Cloud Threat Report
15
Misconfiguration Example
16
Public Website Example
17
How to Get Diagrams
18
Helm Scanner
19
Wildcard Roles
20
Deployment Roles
21
Other Considerations
22
Advice
23
Security
Description:
Explore strategies for minimizing the blast radius of chained Kubernetes misconfigurations and image vulnerabilities in this Linux Foundation live webinar. Delve into the persona of a developer, witness a small demo, and examine default Helm chart security. Investigate Helm chart misconfigs, Kubernetes policies, and the balance between security and usability. Learn about valid Kubernetes practices, public health charts, and implementing a Kubernetes checkoff process. Discover how to leverage GitHub Actions for security, address common problems in cloud security, and analyze the Unit42 Cloud Threat Report. Examine misconfiguration and public website examples, and gain insights into using Helm scanners. Explore wildcard roles, deployment roles, and other crucial considerations. Receive valuable advice on enhancing Kubernetes security to protect your containerized applications and infrastructure.

Minimizing Blast Radius of Chained Kubernetes Misconfigurations and Image Vulnerabilities

Linux Foundation
Add to list
0:00 / 0:00