Session
K8s Security Safari: Hunting Threats in the Wild Wild Cloud
Kubernetes is spreading through the world faster than a viral dance challenge on social media. As the K8S ecosystem on the cloud gains more attention and spotlight, hackers actively seek ways to bounce between clusters and clouds, aiming for unauthorized access.
Join us to delve deep into the K8S security fundamentals on the different cloud providers and their logging system. Explore K8S TTPs, K8S to cloud environment attack vectors and IAM role abuse. Gain a comprehensive understanding of conducting threat hunting on K8S, utilizing your cloud provider and K8S logs to identify threat actors, particularly related to lateral movement and privilege escalation methods within the K8S environment.
CloudNative SecurityCon 2024 Seattle, WA
https://www.youtube.com/watch?v=NTYXpHJ3O6I
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top