Главная
Study mode:
on
1
Intro
2
Configuration Vulnerability
3
Developer Ownership
4
Security Context
5
Privileged Pods
6
Demo
7
When do we need root containers
8
Run is nonroot
9
Resource limitations
10
CPU throttling
11
Memory throttling
12
Next demo
13
Conclusions
14
Recap
15
Conclusion
16
Secure base
17
Quality vs quantity
18
Sneak Infrastructure Demo
19
Questions
20
OKD vs Kubernetes
21
Privilege Run Mode
22
Code Injection
23
Privilege vs Root
24
Demo code
25
Memory limits
26
Sample apps
27
Architecture
28
Image Root Access
29
Pod Security Policies
30
Shifting Security Responsibility
31
Is it enough
32
Does a sneak container gathered scan
33
How to validate Kubernetes
34
Setting a memory limited model
Description:
Explore common Kubernetes misconfigurations and security vulnerabilities in this 58-minute webinar sponsored by Snyk. Dive into topics such as configuration vulnerabilities, developer ownership, security contexts, and privileged pods. Learn about the importance of resource limitations, including CPU and memory throttling. Discover when root containers are necessary and how to implement "run as non-root" practices. Examine pod security policies, shifting security responsibilities, and methods for validating Kubernetes setups. Gain insights on balancing quality and quantity in security measures, and explore the differences between OKD and Kubernetes. Participate in live demonstrations and Q&A sessions covering privilege run modes, code injection, and memory limits. Enhance your Kubernetes security knowledge with practical examples and expert guidance on creating a secure infrastructure.

Hack My Mis-Configured Kubernetes: Security Vulnerabilities and Best Practices

Linux Foundation
Add to list