Loading…

线上峰会
12月9-10日
了解更多信息注册参加

Sched 应用程式允许你建立你的日程表,但不能代替你的活动注册。你必须注册 2021年中国 KubeCon + CloudNativeCon + Open Source Summit - 线上峰会 才能参加会议。如果你还没有注册但想加入我们,请到活动注册页面购票注册。

请注意:此日程表自动显示为中国标准时间(UTC +8)。要想看到您选择的时区,请从右侧 「Filter by Date」上方的下拉菜单中选择。日程表可能会有变动。


Virtual
December 9-10
Learn More and Register to Attend

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for KubeCon + CloudNativeCon + Open Source Summit China 2021 - Virtual to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

Please note: This schedule is automatically displayed in China Standard Time (UTC +8). To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date." The schedule is subject to change.
Thursday, December 9 • 12:10 - 12:45
Redteam 观点:K8s 集群管理员的安全实践 | Redteam Views: Security Practice of K8s Cluster Administrator - Zebin Zhou, Tencent

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
现实世界中的恶意攻击者如何攻击 K8s 群集?如何防止容器逃逸?如何防止黑客绕过普通旧数据安全策略?如何防止黑客侧向移动?本次演讲将回答上述问题。开发人员和集群管理员可以学习如何构建一个安全的、多租户的、大规模的 Kubernetes 集群,并根据本讲座保护集群中的容器和数据。在过去的几年中,这位演讲者在 Blackhat、Hack In the Box、CIS 和 WHT 等会议上分享了黑客如何攻击 Kubernetes 和 Service Mesh 等基础设施。“研究攻击技术”的目的是为了防御,本课题将分享腾讯在多租户 Kubernetes 集群安全建设方面的经验和思路,并使用 read-world 攻击案例展示安全风险并提出解决方案。

How do real-world malicious attackers attack the K8s cluster? How to prevent container-escape? How to prevent hackers from bypassing Pod Security Policy? How to prevent hackers from lateral movement? This talk will answer the questions above. Developers and cluster administrators can learn how to build a secure, multi-tenant, large-scale Kubernetes cluster, and protect the containers and data in the cluster based on this talk. In the past few years, the speaker have shared how hackers attacked infrastructure such as Kubernetes and Service Mesh at conferences such as Blackhat, Hack In The Box, CIS, and WHT and so on. The purpose of "researching attack techniques" is for defend, this topic will share Tencent's experience and thoughts on security construction in multi-tenant Kubernetes clusters, and use read-world attack cases to show security risks and propose solutions.

Speakers
avatar for Zebin Zhou

Zebin Zhou

https://github.com/neargle/, Tencent Cloud
# NEARGLE - 📒 https://github.com/neargle/  - 📮nearg1e.com@gmail.com1. Security Researcher @Tencent Security Platform Department, Thanks to Tencent Kubernetes Engine Team.2. Published several security research topics about container, Kubernetes and services mesh:    * Kubernetes... Read More →


Thursday December 9, 2021 12:10 - 12:45 CST
Kubecon + CloudNativeCon 演讲厅