Compromising Kubernetes Cluster by Exploiting RBAC Permissions


Posted on in Presentations

Attackers are increasingly targeting Kubernetes clusters to compromise applications or abuse resources for things like crypto-coin mining. Through live demos, this research-based session will show attendees how. Eviatar Gerzi, who researches DevOps security, will also introduce an open source tool designed to help blue and red teams discover and eliminate risky permissions.

Pre-Requisites: Basic experience with Kubernetes and familiarity with docker containers.

Participants
Eviatar Gerzi

Participant

Senior Security Researcher, CyberArk


Share With Your Community