Overview
Dive into an action-packed presentation on advanced Kubernetes security techniques and strategies. Explore both common and sophisticated attack methods as Ellen Körbes and Tabitha Sable demonstrate live hacking and defense scenarios. Learn how to leverage Kubernetes as a platform to enhance your security practices, including addressing software supply chain vulnerabilities. Gain insights into utilizing Kubernetes beyond its traditional deployment and scaling functions to fortify your overall security posture. Walk away with inspiration and practical knowledge to elevate your approach to Kubernetes security and tackle contemporary challenges in the cloud-native landscape.
Syllabus
Intro
Tabitha
Tabitha Sable
Set Comp Default
Finding a different vulnerability
What can you do
Old times
Open SSH 23
Open SSH 22
Testing
zag spike
who are these people
mailcat
mandatory commit signing
hijacking the images
congratulations
devopsy
Transformation
Math
Call me
Im ready
Wrap up
Taught by
CNCF [Cloud Native Computing Foundation]