Security in Kubernetes - How to do it right!
▬▬▬▬▬▬ SHOW SPONSOR ▬▬▬▬▬▬
As a special offer for the OWASP DevSlop audience, sign up for a free 2-week Datadog trial and receive a Datadog t-shirt! https://www.datadoghq.com/owasp-devslop
▬▬▬▬▬▬ Giveaway Winners ▬▬▬▬▬▬
Nana's CKA course: @Pramod P - Please email owasp.devslop@gmail.com to claim your prize. Deadline: UTC, Time Zone Sun, Dec 5, 2021 at 17h30
Ebook bundle winners: @sumesh s @Israel Torres @Isaac Thomas @wildpug33 @Kedarnath Belavanaki @Security Grit please e-mail us at owasp.devslop@gmail.com we want to thank you for your question(s)
▬▬▬▬▬▬ ABSTRACT & BIO 📝 ▬▬▬▬▬▬
Kubernetes is becoming the standard in the DevOps world. Teams are adopting it very fast, but rarely with enough time to really understand how it works and what are all the right ways to configure and work with K8s. And lacking knowledge in k8s can of course lead to various misconfigurations and security issues in k8s clusters. So in this episode, we will see some of the easy and practical ways to make sure we configure and run secure clusters.
NANA JANASHIA
Nana is a DevOps engineer and trainer. She started the Techworld with Nana channel to share her expertise about various DevOps topics and to help DevOps enthusiasts get into the field easier and with more motivation. Through her channel and different courses, she has reached millions of people. Her passion is to explain complex topics easily so that everyone understands them. She consults teams of developers to help them improve their existing processes for CI/CD, containerization and orchestration.
▬▬▬▬▬▬ LINKS🔗 ▬▬▬▬▬▬
➼Nana’s CKA course: https://www.techworld-with-nana.com/kubernetes-administrator-cka
➼Nana’s DevOps Bootcamp: https://www.techworld-with-nana.com/devops-bootcamp
➼Nana’s Upcoming DevSecOps course:
https://www.techworld-with-nana.com/course-roadmap
▬▬▬▬▬▬ Producer 🎥 ▬▬▬▬▬▬
Nancy Gariché ► https://www.linkedin.com/in/nancygariche
▬▬▬▬▬▬ Hosts 🎙️ ▬▬▬▬▬▬
Nikki Becher ► https://twitter.com/thedeadrobots
Renan Dias ► https://twitter.com/DojoWithRenan
▬▬▬▬▬▬ Connect with Us 👋 ▬▬▬▬▬▬
YOUTUBE ► https://www.youtube.com/c/OWASPDevSlop/
INSTAGRAM ► https://www.instagram.com/owaspdevslop/
TWITTER ► https://twitter.com/Owasp_DevSlop
LINKEDIN ► https://www.linkedin.com/company/owasp-devslop
MEETUP.COM ► https://www.meetup.com/OWASP-DevSlop-Project/
Видео Security in Kubernetes - How to do it right! канала OWASP DevSlop
As a special offer for the OWASP DevSlop audience, sign up for a free 2-week Datadog trial and receive a Datadog t-shirt! https://www.datadoghq.com/owasp-devslop
▬▬▬▬▬▬ Giveaway Winners ▬▬▬▬▬▬
Nana's CKA course: @Pramod P - Please email owasp.devslop@gmail.com to claim your prize. Deadline: UTC, Time Zone Sun, Dec 5, 2021 at 17h30
Ebook bundle winners: @sumesh s @Israel Torres @Isaac Thomas @wildpug33 @Kedarnath Belavanaki @Security Grit please e-mail us at owasp.devslop@gmail.com we want to thank you for your question(s)
▬▬▬▬▬▬ ABSTRACT & BIO 📝 ▬▬▬▬▬▬
Kubernetes is becoming the standard in the DevOps world. Teams are adopting it very fast, but rarely with enough time to really understand how it works and what are all the right ways to configure and work with K8s. And lacking knowledge in k8s can of course lead to various misconfigurations and security issues in k8s clusters. So in this episode, we will see some of the easy and practical ways to make sure we configure and run secure clusters.
NANA JANASHIA
Nana is a DevOps engineer and trainer. She started the Techworld with Nana channel to share her expertise about various DevOps topics and to help DevOps enthusiasts get into the field easier and with more motivation. Through her channel and different courses, she has reached millions of people. Her passion is to explain complex topics easily so that everyone understands them. She consults teams of developers to help them improve their existing processes for CI/CD, containerization and orchestration.
▬▬▬▬▬▬ LINKS🔗 ▬▬▬▬▬▬
➼Nana’s CKA course: https://www.techworld-with-nana.com/kubernetes-administrator-cka
➼Nana’s DevOps Bootcamp: https://www.techworld-with-nana.com/devops-bootcamp
➼Nana’s Upcoming DevSecOps course:
https://www.techworld-with-nana.com/course-roadmap
▬▬▬▬▬▬ Producer 🎥 ▬▬▬▬▬▬
Nancy Gariché ► https://www.linkedin.com/in/nancygariche
▬▬▬▬▬▬ Hosts 🎙️ ▬▬▬▬▬▬
Nikki Becher ► https://twitter.com/thedeadrobots
Renan Dias ► https://twitter.com/DojoWithRenan
▬▬▬▬▬▬ Connect with Us 👋 ▬▬▬▬▬▬
YOUTUBE ► https://www.youtube.com/c/OWASPDevSlop/
INSTAGRAM ► https://www.instagram.com/owaspdevslop/
TWITTER ► https://twitter.com/Owasp_DevSlop
LINKEDIN ► https://www.linkedin.com/company/owasp-devslop
MEETUP.COM ► https://www.meetup.com/OWASP-DevSlop-Project/
Видео Security in Kubernetes - How to do it right! канала OWASP DevSlop
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Embrace Secure Defaults, Block Anti-patterns, and Kill Bug Classes with Semgrep with Clint GiblerOWASP DevSlop Show: Rapid Threat Model Prototyping with Geoffrey Hill!DevSlop Game Day Recap & Solution with Renan DiasPrivilege Escalation in the Cloud with Carlos PolopThreats Against Application Identities in the Microsoft CloudThe Act of Balancing: Burnout in Cybersecurity with Chloé Messdaghi!Github Actions Security Best Practices with Reethi KottiContainers in a nutshell — ähm pod! Containers in a podKnock Your SOCs Off: Modernizing Security Operations with Kat Sweet!Shifting Cloud Security Left: Scanning Infrastructure as Code for Security IssuesLogging & Monitoring on AWS 101 with Veliswa Boya! - OWASP DevSlopAppSec at the Speed of DevOps: 3 Common Mistakes with Erica Anderson!GitOps and Best Practices for Managing Infrastructure with Javeria Khan!Vulnerability Writeups: The Magical 5 Minute FormulaCeci n'est pas une Pipeline: is it CI/CD or WHAT?Compromised Compilers - A new perspective of supply chain cyber attacksAutomating Cloud Security with Open Policy Agent with Josh Stella! - OWASP DevSlopCloud Security and IAM for DevelopersYellow Team + Blue Team = Green TeamAccount Security beyond 2FA with Neil MatatallLearning from AWS (Customer) Security Breaches with Rami McCarthy