Overview
Dive into a hands-on tutorial that explores how attackers can compromise Kubernetes clusters and learn essential defense strategies. Using a kind cluster configuration with provided manifests, explore in-depth aspects of Kubernetes architecture through practical exercises. Discover the inner workings of the Kubelet API, understand Kubernetes authentication and authorization mechanisms, and learn how seemingly harmless pods could be leveraged to gain root access to cluster nodes. Bring a laptop capable of running a kind cluster (have kind installed before starting) to participate in this interactive hacking session led by experts Rory McCune from Datadog, Marion McCune from ScotSTS, and Iain Smart from AmberWolf. Perfect for security-minded Kubernetes users who want to strengthen their cluster defenses through understanding attack vectors.
Syllabus
Tutorial: Hacking up a Storm With Kubernetes - Rory McCune, Datadog; Marion McCune & Iain Smart
Taught by
CNCF [Cloud Native Computing Foundation]