Compromising Kubernetes Cluster by Exploiting RBAC Permissions
Eviatar Gerzi, Security Researcher, CyberArk
Attackers are increasingly targeting Kubernetes clusters to compromise applications or abuse resources for things like crypto-coin mining. Through live demos, this research-based session will show attendees how. Eviatar Gerzi, who researches DevOps security, will also introduce an open source tool designed to help blue and red teams discover and eliminate risky permissions.Pre-Requisites: Basic experience with Kubernetes and familiarity with docker containers.
Видео Compromising Kubernetes Cluster by Exploiting RBAC Permissions канала RSA Conference
Attackers are increasingly targeting Kubernetes clusters to compromise applications or abuse resources for things like crypto-coin mining. Through live demos, this research-based session will show attendees how. Eviatar Gerzi, who researches DevOps security, will also introduce an open source tool designed to help blue and red teams discover and eliminate risky permissions.Pre-Requisites: Basic experience with Kubernetes and familiarity with docker containers.
Видео Compromising Kubernetes Cluster by Exploiting RBAC Permissions канала RSA Conference
Комментарии отсутствуют
Информация о видео
27 февраля 2020 г. 2:03:59
00:48:55
Другие видео канала