How can a tiny vulnerability in a web application result in your entire Kubernetes cluster and cloud provider account being taken over? In this talk, we use a live system to show how a hacker could do exactly that.
You’ll learn about different attack vectors and how to protect against each one with a multi-layered security strategy. And all of this with the help of open-source tools like NeuVector and Kubewarden, which you can leverage off to protect your systems during Supply Chain and at Runtime.
Focus:
– Presentation of modern challenges in securing Kubernetes environments
– Penetrating an environment via known vulnerabilities
– Securing the environment from threats and attacks