Главная
Study mode:
on
1
Intro
2
What is Kubernetes?
3
So, What is Core Kubernetes?
4
Why is this important?
5
Where does Usability Come in?
6
Exposed Clusters
7
Outdated Clusters
8
Solution - Clusters As Cattle Not Pets
9
Kubernetes Authentication
10
Solution - Enforced External AuthN
11
RBAC Complexity
12
Solution - Minimal Interactive Access
13
Flat Networks
14
Solution - Default Deny Networks
15
Breakout to underlying nod
16
Solution - Admission Control
17
Kubernetes and Multi-Tenan
18
Solution - Kubernetes Cluster API
19
A Secure Kubernetes Solution
20
Conclusion
Description:
Explore Kubernetes cluster security and usability in this 49-minute conference talk by Rory McCune, Cloud Native Security Advocate at Aqua Security. Gain practical, defense-oriented insights into two main areas of Kubernetes security, focusing on usable defensive measures for immediate implementation. Learn about common misconfigurations in newly deployed clusters, surprising default settings chosen by providers, and scalable approaches to cluster security. Discover strategies for different threat models, including shared clusters among developer groups and multi-tenant configurations with Internet-facing applications. Delve into topics such as exposed clusters, outdated clusters, authentication, RBAC complexity, network security, and admission control. Acquire valuable knowledge to enhance your Kubernetes security posture and make informed decisions about cluster management.

Kubernetes Cluster Security and Usability: Best Practices and Common Pitfalls

OWASP Foundation
Add to list
0:00 / 0:00