Главная
Study mode:
on
1
Intro
2
Awesome K8s Security List
3
MITRE ATT&CK Framework ATT&C
4
K8s Threat Matrix by Microsoft
5
MITRE ATT&CK for Containers (and K8s)
6
Initial Access
7
Exploitation/Execution
8
kube-hunter
9
Internal Recon - Inspect the K8s env
10
Post-Exploitation / Persistence
11
Defending K8s
12
The Kube API Server
13
CIS Kubernetes Benchmark
14
Image Scanning
15
The Pods
16
Pod Security Policy (PSP)
17
PSP Replacement Alternatives
18
RBAC (Role Based Access Control)
19
The etcd
20
The Network Policy
21
The Audit Logs
22
The Basics
Description:
Explore Kubernetes security through a comprehensive conference talk that delves into attacking and defending K8s clusters. Gain insights into real-world attack scenarios using actual applications, understanding Kubernetes architecture, and leveraging the K8s Threat Matrix and MITRE ATT&CK for Containers. Learn about reconnaissance, exploitation, and post-exploitation phases, and discover best practices for securing clusters based on CIS Benchmarks. Master the implementation of Role-based access control (RBAC), audit logs, and network policies to enhance cluster security and prevent lateral movement by attackers.

Kubernetes Security: Attacking and Defending K8s Clusters

OWASP Foundation
Add to list