Video není dostupné.
Omlouváme se.

Kubernetes Security Best Practices - Ian Lewis, Google

Sdílet
Vložit
  • čas přidán 7. 08. 2024
  • Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference features presentations from developers and end users of Kubernetes, Prometheus, Envoy, and all of the other CNCF-hosted projects
    Kubernetes Security Best Practices - Ian Lewis, Google
    Containers give developers the ability to isolate applications from one another, but that’s not enough. Resource isolation is much different that security isolation. How do we make applications deployed in containers more secure? What tools can be we apply to our containers running in Kubernetes to make them more secure? How can we apply policy to our network and services to make sure applications only have access to what they need and nothing more?
    In this talk, attendees will learn about the risks and attack surfaces of a Kubernetes cluster. s-We'll look at tools like PodSecurityPolicy, SELinux, AppArmor, seccomp, and sandboxed containers in action to improve the security of containers. We’ll then go up the stack and learn how to apply network policy to containers to further improve security.

Komentáře • 17

  • @domaincontroller
    @domaincontroller Před 3 lety +14

    07:33 Attacking Kubernetes cluster itself, Kubernetes API server 09:01 RBAC 10:58 API Firewall 11:35 NetworkPolicy 13:20 Get access to cluster components, etcd

  • @devops-boot-camp
    @devops-boot-camp Před 2 lety +1

    Thanks Ian, it's still relevant in 2021 😃

  • @venkatbollimuntha178
    @venkatbollimuntha178 Před 3 lety +2

    Ian, Thanks so much. Great presentation, and excellent coverage of K8S security best practices.

  • @rashmitrathod6873
    @rashmitrathod6873 Před 3 lety

    Excellent presentation. Very concise in terms on identifying what are possible areas to secure and how to secure for containerized workload running on Kubernetes.

  • @phanikumar1502
    @phanikumar1502 Před 3 lety +2

    Hello Ian, Rocking presentation which is clear and easy to understand for newbies .

  • @tanelikantomaa9540
    @tanelikantomaa9540 Před 3 lety

    Nice! Really good presentation with illustrative pictures. Thanks Ian!

  • @roshelliwanag9447
    @roshelliwanag9447 Před 4 lety +4

    Hi Ian. Your presentation is clear and I was able to grasp your ideas easily. Thanks. I am also interested in the remaining topics not covered in your presentation - Threat detection, Build Hygiene and SecOps. Could you recommend good articles or videos regarding those topics? Thanks in advance.

  • @wilbertopalomar4187
    @wilbertopalomar4187 Před 2 lety

    Thanks for the excellent presentation Ian. Great parallels on Defense In Depth principle where it underpins the logical flow: Network -> Host -> Supply Chain (Application) -> Data vs. a threat model driven by it (layered defense). Also, it's worth pondering on the importance of Infra Code security first (for those orgamisations mature enough to drive everything via code e.g. Terraform, Crossplane, or ClusterAPI) where it's critical on CI/CD/Progressive Delivery DevSecOps cycle given that it builds entirely on what's being presented.

  • @JavierPortillo1
    @JavierPortillo1 Před 3 lety

    Thanks for your presentation

  • @chayanchoudhury6041
    @chayanchoudhury6041 Před 2 lety

    Very helpful..precise..

  • @CloudNativeJanitor
    @CloudNativeJanitor Před 3 lety

    awesome

  • @udayprabhu4751
    @udayprabhu4751 Před 3 lety

    Very good talk

  • @siavashmohammady9095
    @siavashmohammady9095 Před 2 lety

    thank you so much

  • @nestorreveron
    @nestorreveron Před 2 lety

    Thanks

  • @yongshengyang8144
    @yongshengyang8144 Před 3 lety

    Nice topics

  • @ChristianPeper
    @ChristianPeper Před rokem

    👍thanks, even now

  • @nah0221
    @nah0221 Před 3 lety

    fruitful !