Hack My Mis-Configured Kubernetes

Featuring

  • Snyk

About This Webinar

In the last few years, we’ve seen more and more responsibilities shift left – to development teams. With the widespread adoption of Kubernetes, we’re now seeing configurations become a developer issue first and foremost. This responsibility means that developers need to be aware of the security risks involved in their configurations.
Just by themselves, those configuration security risks might not be so harmful. But with other vulnerable components in the production environment, like the libraries used in the application, or a malicious container, potential attackers can build a multi-steps attack vector, using all of these risks together. As developers, we should give the necessary attention to those risks, and make sure that our applications and clusters are as secure as possible.

  1. Scott Bekker

    Host Scott Bekker Webinar Moderator ActualTech Media

  2. Eric Smalling

    Featuring Eric Smalling Senior Developer Advocate Snyk

What You'll Learn

  1. Security context pitfalls like Privileged pods
  2. Hack my Mis-Configured Kubernetes
  3. We explain what they actually mean, what an attacker can do to your cluster, and how you can fix them