Тёмный

What We've Learned from Scanning 10K+ Kubernetes Clusters by Rotem Refael 

Devoxx
Подписаться 158 тыс.
Просмотров 3,2 тыс.
50% 1

The number of misconfigurations, unpatched vulnerabilities, and overly-privileged users in Kubernetes systems is ASTOUNDING. We learned this from analyzing the telemetry data from the open source tool Kubescape, that has scanned more than 10K+ unique Kubernetes clusters, and we have learned a great deal about the state of Kubernetes risk, compliance, and security vulnerabilities.
In this talk we'll shed light on the most common misconfigurations across Kubernetes deployments (managed and self-managed) according to multiple frameworks (such as the NSA-CISA, MITRE ATT&CK®), alongside known software vulnerabilities, and RBAC (role-based-access-control) violations at early stages of the CI/CD pipeline. We will demonstrate how you can instantly calculate your own risk score, and you'll walk away able to discover and manage your own risks, over time, through constantly changing security trends.
We'll also provide interesting insights on why and where Kubernetes deployments mostly commonly fail and statistics on which controls fail most, as well as the weak spots and gotchas to pay attention to. Stick around though, as we'll wrap up with some simple measures your can take immediately to work towards eliminating these risks and improving your overall cloud native security posture.

Опубликовано:

 

13 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии    
Далее
Non-blocking IO under the Hood
1:00:08
Просмотров 6 тыс.
But What Is Cloud Native Really All About?
7:32
Просмотров 147 тыс.
Kubernetes Tutorial for Beginners [1 Hour Course]
1:01:19
Observability vs. Monitoring
14:15
Просмотров 29 тыс.