Главная
Study mode:
on
1
Introduction
2
How secure is Kubernetes
3
Insecure workload configurations
4
Supply chain vulnerabilities
5
Overly permissive RBack configuration
6
Lack of centralized policy enforcement
7
Inadequate logging and monitoring
8
Broken authentication
9
Missing network segmentation
10
Redis example
11
Service Mesh
12
Secret Management
13
Components
14
CIS Benchmark
15
API Versions
16
Kubernetes isnt secure
17
Questions
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore the OWASP Top 10 for Kubernetes in this 51-minute conference talk from NDC Security 2023. Delve into the community-curated list of common Kubernetes risks, backed by data from organizations of varying maturity and complexity. Learn about insecure workload configurations, supply chain vulnerabilities, overly permissive RBAC configs, lack of centralized policy enforcement, inadequate logging and monitoring, broken authentication, and missing network segmentation. Examine real-world examples, including a Redis case study, and gain insights into service mesh, secret management, components, CIS Benchmark, and API versions. Understand why Kubernetes isn't inherently secure and discover how to get involved in this open-source project to enhance containerized infrastructure security.

Introducing the OWASP Top 10 for Kubernetes

NDC Conferences
Add to list