Webinar On Demand
Hack My Mis-Configured Kubernetes
Recorded January 28, 2021
View a Complimentary Webinar Sponsored by Snyk
Containers and DevOps principles give modern organizations the ability to leverage microservice architectures and enable speed and portability in development, but can also create security risks that increase the attack surface within a production environment. The large majority of organizations today use Kubernetes to orchestrate some portion of their container workloads, but without the proper configurations, Kubernetes can cause serious security issues after an application has been deployed. Due to the DevOps principles that guide Kubernetes management, however, the responsibility of configuring a Kubernetes environment has shifted left to the developer, requiring a process-pivot toward empowering developers with easy-to-use, automated security tooling.
Snyk works closely with Red Hat OpenShift to make Kubernetes management simple and secure, allowing development teams to identify and remediate misconfigurations and even prevent builds or deployments that don’t meet security or DevOps best practices requirements.
In this live hacking presentation, experts from Snyk and Red Hat will demonstrate some of the key security issues that affect a Kubernetes configuration, including:
- Security context pitfalls like Privileged pods
- Running pods without resource limitations
We’ll explain what these security issues entail, what an attacker can do to a Kubernetes cluster, and how development teams can fix them.
This webinar is sponsored by Snyk and hosted by The Linux Foundation.
Or Kamara, Snyk Development Team Lead
Or Kamara is a development team lead at Snyk, a developer-first security company that helps organizations use open source and stay secure. Or has led the development of complex cybersecurity projects, and has over ten years of experience in software engineering, research, and project management.
Prior to Snyk, Or served as a senior security researcher & developer and as a team leader in the prime minister office of Israel.
Scott McCarty, Red Hat Principal Product Manager
Scott McCarty is a principal product manager for the container subsystem team, which enables key product capabilities in OpenShift Container Platform and Red Hat Enterprise Linux. Focus areas include container runtimes, tools, and images. Working closely with engineering teams, at both a product and upstream project level, he combines personal experience with customer and partner feedback to enhance and tailor strategic container features and capabilities.