Главная
Study mode:
on
1
Introduction
2
Overview
3
Workload Security
4
Trust Boundaries
5
Security Posture
6
Scanning your environment
7
Men in the Middle
8
Prerequisites
9
localhost trust boundary vulnerability
10
Disclosure timeline
11
What really happened
12
Kubernetes Audit Log
13
Example
14
QA
Description:
Explore a comprehensive analysis of Kubernetes security, focusing on recent CVE disclosures and their implications in this 47-minute webinar presented by Gadi Naor, CTO & Co-Founder of Alcide. Delve into a holistic approach to Kubernetes security, covering workload protection, trust boundaries, and security posture. Learn how to detect and prevent exploits related to control plane vulnerabilities and network security issues. Gain insights into scanning environments, understanding the "Men in the Middle" concept, and the localhost trust boundary vulnerability. Examine the disclosure timeline, real-world impact, and the role of Kubernetes Audit Logs in security. Conclude with a Q&A session to address specific concerns and deepen your understanding of Kubernetes security best practices.

Kubernetes Security Anatomy and the Recently Disclosed CVEs

CNCF [Cloud Native Computing Foundation]
Add to list