Friday 18 November 2022, 11am-12noon (GMT)
Do you use Kubernetes (or any other open-source container orchestration system) to help automate your software deployment and management?
As with other systems, default Kubernetes deployment introduces several attack vectors and could allow a skilled attacker into your environment. Failing to address these vulnerabilities during setup would enable attackers to compromise a native cloud or on-premises Kubernetes environment and move laterally within the organisation’s systems.
In this webinar, we discussed Kubernetes security and several attack vectors that could allow an attacker to compromise an on-premises, managed cloud-based Kubernetes service.
We demonstrated how an attacker targets both on-premises and cloud-based Kubernetes services, and how you can defend against such attacks.
Guest chaired by
Amanda Coleman (info), Director, Amanda Coleman Communication
Presented by
Sadi Zane (info), Principal Security Consultant, BSI