null Global Committee elections are coming up! See the election repository for more information.

8d2232de3c0af4d3423a9e13eb43cb6b

Abstract

With increasing adoption of Kubernetes, defenders need to examine the Attack surface for their clusters. We do so by looking at key attack vectors leveraged by Threat Actors. The presentation simulates real-world attacks, such as exploitation of vulnerabilities, Container Escape and Lateral movement, demonstrating successful exploitation. With each threat vector we also cover practical defense strategies, showcasing how to mitigate these attacks through hardening, monitoring and secure configurations. Defense topics cover - Pod Security Policies/Admission, Mandatory Access controls, Distroless images and Network Policy. Attendees will gain actionable insights into essential defenses and best practices for securing Kubernetes environments.

Speaker

Abhimanyu iyer

Timing

Starts at Saturday October 26 2024, 12:15 PM. The sessions runs for about 1 hour.

Resources