logo

The Hacker's Guide to Kubernetes

2023-04-19

Authors:   Patrycja Wegrzynowicz


Summary

The presentation discusses the importance of implementing layered security measures in Kubernetes deployments to improve overall security and prevent vulnerabilities.
  • Implementing layered security measures in Kubernetes deployments is crucial to prevent vulnerabilities and improve overall security.
  • Missing network segmentation and outdated/vulnerable components are common vulnerabilities that can be exploited.
  • Anonymous access to data stores or workloads should be avoided.
  • Continuous learning is essential in software development and DevOps.
  • The Swiss cheese security model illustrates the importance of layered security.
  • An anecdote is provided to illustrate how a vulnerable workload in a Kubernetes deployment can impact other workloads in the same cluster.
The presenter demonstrates how a vulnerable RCE hello application in a Kubernetes deployment can be used to access and hijack accounts in another application in the same cluster due to missing network segmentation. This highlights the importance of implementing layered security measures to prevent vulnerabilities and protect against potential security threats.

Abstract

Do you want to see live Kubernetes hacking? Come to see interactive demos where your newly registered accounts in k8s application are hijacked. This talk guides you through various security risk of Kubernetes, focusing on OWASP Kubernetes Top 10 list. In live demos, you will find out how to exploit a range of vulnerabilities or misconfigurations in your k8s clusters, attacking containers, pods, network, or k8s components, leading to an ultimate compromise of user accounts in an exemplary web application. You will learn about common mistakes and vulnerabilities along with the best practices for hardening your Kubernetes systems.

Materials: