Explore strategies for minimizing the blast radius of chained Kubernetes misconfigurations and image vulnerabilities in this Linux Foundation live webinar. Delve into the persona of a developer, witness a small demo, and examine default Helm chart security. Investigate Helm chart misconfigs, Kubernetes policies, and the balance between security and usability. Learn about valid Kubernetes practices, public health charts, and implementing a Kubernetes checkoff process. Discover how to leverage GitHub Actions for security, address common problems in cloud security, and analyze the Unit42 Cloud Threat Report. Examine misconfiguration and public website examples, and gain insights into using Helm scanners. Explore wildcard roles, deployment roles, and other crucial considerations. Receive valuable advice on enhancing Kubernetes security to protect your containerized applications and infrastructure.
Minimizing Blast Radius of Chained Kubernetes Misconfigurations and Image Vulnerabilities