Are you familiar with Sidecars in Kubernetes? We spoke to Magno Logan about the complex world of Kubernetes security and the silent but deadly vulnerabilities associated with sidecar containers. Magno shares his extensive research and insights on how attackers can exploit these vulnerabilities to stay hidden within a Kubernetes environment, posing significant threats beyond the commonly discussed crypto mining attacks. Magno spoke about common attack paths targeting Kubernetes clusters, from exploiting application vulnerabilities to leveraging exposed Kubernetes services and compromised valid accounts.
Guest Socials: Magno Logan
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:26) A bit about Magno Logan
(01:49) Kubernetes Common Threats Explained
(02:23) Kubernetes Cluster Attack Entry Points
(04:28) How attackers maintain persistent access in Kubernetes?
(05:30) Container Escape Explained
(07:03) Maintaining Persistence in Kubernetes Clusters
(08:18) What are Sidecars?
(10:43) How to secure your sidecars?
(12:33) Where can people learn more about this
(13:57) The Fun Section
Resources spoken about on the podcast
Mitre Att&ck Containers Matrix
Microsoft Threat Matrix
Hacker Valley Studio - ExIST Framework to reach Peak Performance in CyberSecurity
Finding Security Bugs in Google Cloud - Kat Traxler
Hacker stories from the Internet - Darknet Diaries
CSO Hall of Fame - 21 yrs in Cybersecurity: Challenges THEN & NOW
Finding and Fixing SECURITY BUGS IN GOOGLE CLOUD - Dylan Ayrey
Attacking and Defending Managed Kubernetes Clusters - Brad Geesaman
Kubernetes Runtime Threat Detection and Response - Falco, Sysdig
Study Hall - Attacking K8S Cluster Defaults!
Start here for Kubernetes Security - Magno Logan
Study Hall - Kubernetes Concepts and Architecture Explained!
Risk Analysis of Kubernetes Security - Mark Manning, Snowflake
Study Hall - What is Kubernetes & Why do you NEED TO know about it?
Kubernetes (Goat) Vulnerable by Design - Madhu Akula
CISO PERSPECTIVE SERIES: LINKEDIN CISO - Geoff Belknap
Study Hall: Honest truth behind learning Kubernetes
Building Threat Detection for your Cloud Environment
Cloud Governance using Infrastructure as Code (IaC)
Kubernetes Security Explained for those starting today! - Kelsey Hightower
Getting Infrastructure as Code (IaC) Security Culture right! - Yoni Leitersdorf
Azure Security Best Practices for Cloud Architects - John Savill
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast