logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: James Cleverley-Prance, Fabian Kammel
2023-04-21

tldr - powered by Generative AI

The presentation discusses the importance of threat modeling and demonstrates common attacks and defensive techniques against Kubernetes clusters and workloads.
  • Threat modeling is important to identify and address security risks in a system before it goes into production.
  • The Microsoft threat matrix for Kubernetes is a useful resource for identifying tactics and entry points an attacker could use and the mitigations to prevent them.
  • The presentation demonstrates six exploit scenarios, including leveraging a compromised container, exploiting RBAC misconfigurations, and hijacking the entire cluster.
  • For each scenario, the impact of the attack is discussed, and controls and mitigation strategies are presented.
  • The presentation concludes with a summary of the lessons learned.
Authors: Savitha Raghunathan, Tabitha Sable, Ala Dewberry
2022-10-27

tldr - powered by Generative AI

The presentation discusses the importance of self-assessments in Kubernetes security and how it empowers autonomy. It also highlights the Cappy self-assessment and its positive outcome.
  • Self-assessments are important in determining the security posture of a workflow in a project and identifying areas for improvement
  • The Cappy self-assessment was successful and led to the creation of a sub-project in Kubernetes
  • Self-assessments empower autonomy by allowing teams to take ownership of their security posture and make improvements
  • Action items from the assessment should be captured and implemented to improve security
  • North Star goals for sub-projects should be established to guide the self-assessment process
Authors: Alban Crequy, Mauricio Vásquez Bernal
2022-10-26

tldr - powered by Generative AI

The presentation discusses the use of tools for developing initial security policies and network policies in Kubernetes environments. It also explores the challenges of maintaining these policies over time as applications change.
  • Tools can be used to develop initial security policies in Kubernetes environments
  • Network policies are generated based on captured traffic and enriched with Kubernetes-related information
  • Maintaining policies over time can be challenging as applications change and may require new capabilities or system calls
  • Automatic updates to policies may not be reliable without human supervision
Authors: Savitha Raghunathan, Tabitha Sable, Rey Lejano, Pushkar Joglekar
2022-05-20

SIG Security takes a community-building approach to improving Kubernetes security, both for the project itself and our end users. Join organizers Pushkar, Rey, Savitha, and Tabitha for an overview of how we make space for security collaboration to thrive. We'll share timely updates from our tooling and third-party audit subgroups and information about guided security self-assessments for Kubernetes subprojects. In closing, a deep-dive into our efforts to improve security documentation through blogs, tutorials, whitepapers, and goose honking! You'll learn what's been going on, what’s next, and how you could join in, regardless of your experience from beginner to expert. We hope to see you there!Click here to view captioning/translation in the MeetingPlay platform!