Главная
Study mode:
on
1
Introduction
2
About Andrew
3
Why does this matter
4
Why not security
5
Everything is fine
6
Cuban actors
7
Agenda
8
Kubernetes is insecure
9
A back model
10
workload security
11
misconfigurations
12
deployment configuration tool
13
dashboard
14
cluster
15
security again
16
what Kubernetes looks like
17
bootstrap TLS nodes
18
back role access control
19
Legacy Authorization
20
Secure Port
21
Leaking Secrets
22
Certificate rotation
23
Pods
24
Table Security Policies
25
Resource linting
26
Deployments
27
Labels
28
Containers
29
Admission Controllers
30
Limit Ranger
31
Security Policy
32
Encryption
33
Sealed Secrets
34
Token Requests
35
Networking
36
Network Policy
37
Service Mesh
38
Deployment Strategies
39
Recap
40
Multiple Clusters
41
Container Runtimes
Description:
Explore a comprehensive 46-minute conference talk from the OWASP AppSec EU 2018 DevOps Track that delves into the world of Kubernetes security. Gain insights into the Kubernetes security landscape, risks, security models, and best practices. Learn how to configure users and applications with least-privilege, isolate and segregate workloads, and persist configuration across cluster rebuilds. Discover topics such as workload security, misconfigurations, deployment configuration tools, dashboards, cluster security, TLS node bootstrapping, role-based access control, and more. Understand the importance of pod security policies, resource linting, admission controllers, network policies, and deployment strategies. Equip yourself with the knowledge to navigate the complexities of Kubernetes security and ensure a robust, multi-tenanted infrastructure.

Continuous Kubernetes Security - Best Practices and Risk Mitigation

OWASP Foundation
Add to list