Hacking Kubernetes: Live Demo MarathonSecurity
Wednesday February 8th, 5:00pm-5:30pm GMT
Churchill, Ground Floor
In a live evocation of the recent O’Reilly title Hacking Kubernetes (Martin, Hausenblas, 2021), this ultimate guide to threat-driven Kubernetes defence threat models and details how to attack and defend your precious clusters from nefarious adversaries.
This broad and detailed appraisal of end-to-end cluster security teaches you how to attack and defend against a range of historical and current CVEs, misconfigurations, and advanced threats:
– See the historical relevance of CVEs and demonstrations of attacks against your containers, pods, supply chain, network, storage, policy, and wider organisation
– Understand when to use next-generation runtimes like gVisor, firecracker, and Kata Containers
– Delve into workload identity and advanced runtime hardening
– Consider the trust boundaries in soft- and hard-multitenant systems to appraise and limit the effects of compromise
– Learn to navigate the choppy waters of advanced Kubernetes security
Andrew has an incisive security engineering ethos gained building and destroying high-traffic web applications.
Proficient in systems development, testing, and operations, he is at his happiest profiling and securing every tier of a cloud native system, and has battle-hardened experience delivering containerised solutions to enterprise and government.
He is co-author of Hacking Kubernetes published by O’Reilly Media in 2022, https://www.oreilly.com/library/view/hacking-kubernetes/9781492081722/
He is founder and CEO at https://control-plane.io.