Are you familiar with Sidecars in Kubernetes? We spoke to Magno Logan about the complex world of Kubernetes security and the silent but deadly vulnerabilities associated with sidecar containers. Magno shares his extensive research and insights on how attackers can exploit these vulnerabilities to stay hidden within a Kubernetes environment, posing significant threats beyond the commonly discussed crypto mining attacks. Magno spoke about common attack paths targeting Kubernetes clusters, from exploiting application vulnerabilities to leveraging exposed Kubernetes services and compromised valid accounts.
Guest Socials: Magno Logan
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:26) A bit about Magno Logan
(01:49) Kubernetes Common Threats Explained
(02:23) Kubernetes Cluster Attack Entry Points
(04:28) How attackers maintain persistent access in Kubernetes?
(05:30) Container Escape Explained
(07:03) Maintaining Persistence in Kubernetes Clusters
(08:18) What are Sidecars?
(10:43) How to secure your sidecars?
(12:33) Where can people learn more about this
(13:57) The Fun Section
Resources spoken about on the podcast
Mitre Att&ck Containers Matrix
Microsoft Threat Matrix
Offensive Cloud Security Program for 2024
Understand Your Cloud Security Landscape to cut through the noise!
Kubernetes Security Trends 2024 | Software Supply Chain Security, Zero Trust and AI
Kubernetes Network Security for Multi Tenancy
AWS reInvent 2023 - Security highlights and announcements
eBPF - Kubernetes Network Security without the Blind Sides!
Attack Path Analysis for Better Kubernetes Security
Secure your SaaS applications like this!
Threat Detection for not so Common Cloud Services
How to Escape Clusters in a Managed Kubernetes Cluster?
Have I lost my Secrets?
How to become a Senior Cloud Security Engineer?
5 Skills to Level Up Your Cloud Hacking
Become a Cloud Native CISO in 2023
Software Supply Chain Controls for Terraform
Data Security RoadMap in 2023
The Cloud to Code Dilemma - Let's Talk
CISO Perspective: Josh Lemos, CISO of Gitlab
The Azure Cloud Security Pentesting Skills You NEED!
How to detect software supply chain attacks with Honeytokens?
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast