{"id":1689,"date":"2018-09-14T01:44:01","date_gmt":"2018-09-14T08:44:01","guid":{"rendered":"https:\/\/zed.inguardians.com\/?p=1689"},"modified":"2020-02-04T19:15:19","modified_gmt":"2020-02-05T02:15:19","slug":"attacking-and-defending-kubernetes","status":"publish","type":"post","link":"https:\/\/zed.inguardians.com\/videos\/attacking-and-defending-kubernetes\/","title":{"rendered":"Attacking and Defending Kubernetes"},"content":{"rendered":"

In this talk, we will demonstrate attacks on Kubernetes clusters, discuss defenses, then demonstrate how those defenses break the attacks. Come begin your training in Kubernetes attack and defense! The number of companies moving to a microservices model appears to be increasing at an exponential rate, causing a similarly accelerating rate of adoption for Kubernetes and other container orchestration systems. Machine learning work has contributed to this as well, especially with this year’s introduction of native Kubernetes support in Spark. It is time for the information security specialists to learn how to attack Kubernetes clusters, as well as learn how to defend them. In this talk, we will demonstrate attacks on Kubernetes clusters, discuss defenses, then demonstrate how those defenses break the attacks. All demonstrations will be recorded, to avoid interference from the Demo gods. Talk attendees will be able to download the same cluster on which the demos are performed, as well as the configuration files used to break the attacks. Come begin your training in Kubernetes attack and defense!<\/p>\n

 <\/p>\n