Главная
Study mode:
on
1
Introduction
2
Boeing Model 299
3
Checklists in Mitigation
4
Security Incidents
5
Challenges
6
Preincident checklists
7
Audit
8
Opportunity for Detection
9
Network Policies
10
Host Network
11
Build Manifest
12
Docker Image ID
13
Exercise
14
PreIncident vs Incident
15
Step 1 Reproduce
16
Hierarchy
17
Patch
18
Investigation
19
Conclusion
Description:
Discover a comprehensive vulnerability response playbook for Kubernetes infrastructure in this 22-minute conference talk. Learn how to prepare for, mitigate, and clean up after complex vulnerabilities, drawing from experiences with the GKE fleet. Explore the development of response strategies, balancing security and reliability of workloads. Gain insights into Kubernetes tools like audit logs, network policies, and RBAC that can streamline vulnerability response. Delve into topics such as pre-incident checklists, auditing, detection opportunities, and network policies. Follow a step-by-step approach to incident response, including reproduction, patching, and investigation. Enhance your ability to handle security incidents and develop effective contingency plans for your Kubernetes infrastructure.

Hey, Did You Hear About This New CVE? - A Vulnerability Response Playbook

CNCF [Cloud Native Computing Foundation]
Add to list