logo

Hacking into Kubernetes Security for Beginners

Authors:   V Körbes, Tabitha Sable


Summary

The presentation discusses the importance of Kubernetes security and the potential vulnerabilities in the system. The speaker provides an overview of the history of Kubernetes and its evolution, as well as the need to follow security principles and privileges in the system.
  • Kubernetes security is a major challenge for professionals
  • RBAC, admission control, and vulnerabilities in Kubernetes, Linux, code, and dependencies are key concerns
  • Following security principles and privileges in the system is crucial
  • The history of Kubernetes and its evolution is discussed
  • Containers in Kubernetes must be secure for critical systems such as energy grids and healthcare
  • All clouds have vulnerabilities and standards alone are not enough
The speaker mentions the importance of working in the green area of the kernel's security zones and not in the most privileged red area, unless one has special knowledge about security. They use the analogy of feeding alligators to illustrate the potential risks of not following security principles in Kubernetes.

Abstract

While Kubernetes can be challenging to newcomers, Kubernetes security overwhelms even the most seasoned professionals. It's a big challenge, so where should you even start? In this talk, Ellen and Tabitha will present an overview of concerns in Kubernetes security. And not only that: they’ll exploit issues along the way! Topics covered will include RBAC, admission control, and vulnerabilities in Kubernetes, Linux, your code, and underlying dependencies. You'll learn a mental framework, see its real-world impact, and leave with the knowledge you need to be able to “look it up, baby."

Materials:

Tags:

Post a comment

Related work