What We Discuss with Magno Logan:
- Magno’s professional history before becoming a Security Researcher?
- What is Cloud Security?
- What is Kubernetes and what does Kubernetes Security mean for you?
- Why is Kubernetes called Cloud Native and not just a container orchestration platform?
- What is CNCF and Cloud native tools?
- Kubernetes’s relationship to Cloud Native?
- How is Kubernetes different between on-premise and Cloud deployed and managed Kubernetes?
- Using Kubernetes for 5G & 6G technology?
- Kubernetes on Edge devices like mobile phone, IoT, Rasberry Pie?
- Attack Side
- Common Entry points for adversaries to attack Kubernetes?
- Would Cloud Layer of SSRF be applicable for Managed Kubernetes in Cloud?
- What does “Breaking out of container” mean?
- How does one do recon on vulnerable Kubernetes servers?
- How do the vulnerable entry points vary in an Enterprise where there can be multiple clusters?
- What are your thoughts on the ATTACK MITRE for Kubernetes from Microsoft?
- What do you think of the CIS Benchmark for Kubernetes?
- Defence Side
- Low hanging fruits that Security Architects can look out for in a Kubernetes implementation?
- Compliance on Kubernetes deployments?
- Has there been compliance workload deployed in Kubernetes?
- How does CI/CD pipeline – supply chain impact Kubernetes Security?
- Example of a mature deployment of Kubernetes Deployment?
- Where can people start learning about Kubernetes Security?
- And much more…
THANKS, Magno Logan!
If you enjoyed this session with Magno Logan, let him know by clicking on the link below and sending her a quick shout out at Twitter:
Click here to thank Magno Logan at Twitter!
Click here to let Ashish know about your number one takeaway from this episode!
And if you want us to answer your questions on one of our upcoming weekly Feedback Friday episodes, drop us a line at ashish@kaizenteq.com.
Resources from This Episode:
- Magno Logan – Awesome Security List
- Cloud Native Compute Foundation (CNCF)
- Kubernetes CIS Benchmark
- Supply Chain attack examples
- Colonial Pipeline Supply Chain Attack
- DockerHub
- Admission Controller – Kubernetes
- Pod Security Policies – Kubernetes
- OPA – Kubernetes Policy as a Code Tool
- OPA – Rego – Kuberenetes
- Kyverno – Kubernetes Governance Tool
- Sysdig – Falco – Active Monitoring of Kubernetes – Run Time Protection
- Kubernetes Goat – Madhu Akhula
- ReconTools
- Kubernetes Scanning Tools
- Frameworks, discussed during the Interview