Session
Kubernetes Container Orchestration Security Assessment
Kubernetes is one of the leading container orchestration technologies out there. In this course we will teach you how to deploy full featured master and worker nodes with standalone native persistent storage operators. After cluster deployment, we will start attacking the infrastructure and we will explain what is happening underlying and how to harden them.
In this course, a brief overview of container fundamentals will be discussed. After grasping the underlying containerization technology, various platforms to orchestrate them will be explained in details. Among them, Kubernetes as of the leading technologies out there will be chose and installed. Considering deploying a full-featured kubernetes cluster is a time-consuming task, by following a step by step installation, in this course we will show how each component of kubernetes is deployed and what are the security concerns and threats that may arise.
After installing the required infrastructure, we will start attacking the cluster in various scenarios and will show how to patch them. Moreover, common disclosed kubernetes vulnerabilities will be explained through various scenarios.
Auditing and hardening the installed cluster is a vital task to prevent attacks mentioned in this course. We will use various tools like “kube-bench, kubesec.io, etc” to asses currently installed cluster, find the threats and harden them.
Finally, we will show to deploy a sample application and start attacking it from application perspective.

Ali Abdollahi
Information Security Researcher
Amstelveen, The Netherlands
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top