Are you familiar with Sidecars in Kubernetes? We spoke to Magno Logan about the complex world of Kubernetes security and the silent but deadly vulnerabilities associated with sidecar containers. Magno shares his extensive research and insights on how attackers can exploit these vulnerabilities to stay hidden within a Kubernetes environment, posing significant threats beyond the commonly discussed crypto mining attacks. Magno spoke about common attack paths targeting Kubernetes clusters, from exploiting application vulnerabilities to leveraging exposed Kubernetes services and compromised valid accounts.
Guest Socials: Magno Logan
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:26) A bit about Magno Logan
(01:49) Kubernetes Common Threats Explained
(02:23) Kubernetes Cluster Attack Entry Points
(04:28) How attackers maintain persistent access in Kubernetes?
(05:30) Container Escape Explained
(07:03) Maintaining Persistence in Kubernetes Clusters
(08:18) What are Sidecars?
(10:43) How to secure your sidecars?
(12:33) Where can people learn more about this
(13:57) The Fun Section
Resources spoken about on the podcast
Mitre Att&ck Containers Matrix
Microsoft Threat Matrix
Google Cloud Security Pentesting Methodology
Network Pentest 2.0 : The Cloud Pentest Revolution
Google Cloud Hacking Red Team Perspective!
Cloud Security in the BoardRoom - CISO Perspective with Phil Venables
Google Cloud IAP - A Pentester Viewpoint
Doing Google Cloud Security RIGHT!
An AWS Centric View of Google Cloud Identity
So You WANT TO DO Google Cloud Threat Detection - Start here!
Using Data Perimeters in AWS To Scale Guardrails
AWS INCIDENT RESPONSE - Automate Containment
Cloud Security Baseline For Scale
AWS ReInforce 2023 Recap & Highlights
Will Application Security Eat Cloud Security for Lunch!
AI Security - Can LLM be Attacked?
What is DevSecOps? DevSecOps with Cloud & AI explained for 2023
Evolution of Kubernetes Security | KubeCon EU 2023
A DEV FRIENDLY CLOUD NATIVE SECURITY PIPELINE!
THEY SCANNED ENTIRE GITHUB FOR SECRETS AND FOUND THIS!
Kubernetes Cluster Security Audit Explained
Network Security for Kubernetes
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast