The rising adoption of container orchestration tools has enabled developers to scale cloud applications quickly and efficiently. However this adoption comes with a new set of security challenges. Many container orchestrations platforms can easily be set up in a matter of minutes, but hardening these system for production use can take much longer. In this talk I will demo research we conducted that uncovered thousands Kubernetes management consoles and key value stores open to the internet. I will discuss other real world risks and threats facing Kubernetes deployments and provide 10 essential guidelines to harden your clusters.
After completing this session, learner will: - Have an understanding of the importance of container orchestration tools. - Have a working knowledge of real world risks and threats facing Kubernetes clusters. - Know how to replicate research on exposed Kubernetes components. - Learn 10 essential recommendations for securing Kubernetes.
James Condon is Director of Research at Lacework. James is a security veteran with over 10 years of experience in incident response, intelligence analysis, and automated threat detection. James was previously Director of Threat Research at ProtectWise, an Incident Analyst for Mandiant, and a Special Agent in USAF OSI.