Главная
Study mode:
on
1
Introduction
2
How hackers act
3
Precloud vs Cloud
4
Misleading headlines
5
Control Plane Compromise
6
Know Your Environment
7
Cloud Breaches
8
Twitch Breach
9
Whiteboard
10
Imperva
11
Five Fundamentals
12
Questions
Description:
Explore the intricacies of control plane compromise attacks in cloud environments during this 58-minute Linux Foundation webinar sponsored by Fugue, a part of Snyk. Delve into the world of cloud misconfigurations, including architectural design flaws, and their role in major cloud breaches. Learn how attackers exploit the API surface to gain initial access, move laterally, and extract data undetected. Join Josh Stella, Chief Architect at Snyk, as he deconstructs these attacks, demonstrating how hackers operate against the cloud control plane. Gain valuable insights into identifying control plane compromise risks in your environment and understanding the principles of inherently secure cloud design. Through real-world examples like the Twitch breach and Imperva incident, grasp the five fundamentals of cloud security. Equip yourself with the knowledge to think like a cloud hacker and fortify your cloud infrastructure against potential threats.

Deconstructing Control Plane Compromise Attacks in Cloud Environments

Linux Foundation
Add to list