Magno Logan
Magno Logan works as an Information Security Specialist for Trend Micro. He specializes in Cloud, Container, and Application Security Research, Threat Modelling, and DevSecOps. In addition, he has been tapped as a resource speaker for numerous security conferences around the globe.
@magnologan
Which country are you from? –Canada
Session
This presentation aims to talk about different attack scenarios leveraging Kubernetes clusters. We'll dig deeper into an attack scenario using real-world applications to demonstrate different ways attackers and malicious users can use to exploit your cluster and the applications running on it. But first, we’ll give an overview of Kubernetes and its architecture, covering the main components from the Control Plane and the Worker Nodes. Then, we'll use the K8s Threat Matrix, and the MITRE ATT&CK for Containers published this year to discuss the Tactics, Techniques, and Procedures to demonstrate the Recon, Exploitation, and Post-Exploitation phases. After that, we'll provide some best practices for securing your cluster based on the scenarios and the CIS Benchmarks for Kubernetes. We'll show how to use Role-based access control (RBAC) for Access Control, to enable audit logs for security and troubleshooting, and we'll set up some network policies to avoid communication between pods and prevent any lateral movement from attackers.