Compromising Kubernetes Cluster by Exploiting RBAC Permissions


Posted on in Presentations

Attackers are increasingly targeting Kubernetes clusters to compromise applications or abuse resources for things like crypto-coin mining. Through live demos, this research-based session will show attendees how. Eviatar Gerzi, who researches DevOps security, will also introduce an open source tool designed to help blue and red teams discover and eliminate risky permissions.

Pre-Requisites: Basic experience with Kubernetes and familiarity with docker containers.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Eviatar Gerzi

Participant

Senior Security Researcher, CyberArk


Share With Your Community