Top security talks from KubeCon Europe 2024

KubeCon Europe is the largest open source community conference in Europe with hundreds of talks, many of them about security. All the sessions are available online; in this blog, we’ll discuss our favorites.

3 분 읽기

KubeCon + CloudNativeCon Europe 2024 took place last week in Paris Expo de Versailles with over 12,000 attendees. All the conference’s videos have been promptly released on YouTube, some of them within a day of the talk delivery. Kudos to CNCF for such a prompt content turnaround. Overall, there are 246 (!) videos on the KubeCon 2024 playlist

Some of our favorite KubeCon 2024 sessions 

Brewing the Kubernetes Storm Center: Open Source Threat Intelligence for the Cloud Native Ecosystem
It is always interesting to see collaboration between academia and industry, especially in such a tricky area as threat intelligence. Constanze Roedig from TU Wien and James Callaghan from ControlPlane presented their work around collection and dissemination of threat intel in Kubernetes. While Wiz’ Cloud Threat Landscape is a static database, the proposed project takes it a step further and suggests a framework for TI collection (based on eBPF sensors), processing and distribution in STIX/TAXII formats. 

Securing 900 Kubernetes Clusters Without PSP
This is a practical walkthrough through the end-user experience of applying admission controller policies at scale. Tobias Giese and Tjark Rasche describe their policies deployment journey in Mercedes-Benz Tech Innovation, from Pod Security Admission to Validating Admission Policies, while clearly demonstrating the challenges with each method — inflexibility of PSA, policy complexity of OPA, and performance issues in Kyverno. There is something for every practitioner looking to harden their cluster setup. 

Building Container Images the Modern Way
As we go higher in abstraction levels with Kubernetes, we might forget that the foundation of container security is a container image. Adrian Mouat from Chainguard gives a fresh perspective on the process of building images. He introduces several ways to build distroless and lightweight images and offers a valuable recommendation for container build solutions when a docker build is not enough. 

eBPF’s Abilities and Limitations: The Truth
Even though the hype around eBPF has toned down, there are still a lot of misconceptions around eBPF capabilities. Liz Rice and John Fastabend from Isovalent give a realistic rundown of eBPF strengths and weaknesses – something that can help any developer before starting a new project. Or in our case, understand the limitations of applying eBPF as part of a security solution.   

I'll Let Myself In: Kubernetes Privilege Escalation Tactics
Iain Smart and Andrew Martin show a behind-the-stage look at the engagements they have experienced in Control Plane and discuss various privilege escalation techniques they use. I particularly enjoyed the second part of the presentation that talks about rarely mentioned post-compromise activities in the cluster — how attackers can hide their tracks, avoid detection, and achieve silent persistence. This part resonated with our own talk (mentioned below). 

...and two noteworthy talks from Wiz 

Wiz had a powerful representation at this conference with two talks of our own. If you're a beginner / intermediate in the world of Kubernetes, your first security concern should be blocking malicious initial access to your clusters. The session entitled Why Barricade the Door if the Window is Open? Making Sense of Kubernetes Initial Access Vectors will do just that — explain the various ways attackers can gain initial access, while also providing useful detection and protection recommendations for each of those vectors. Finally, if you run managed GKE, AKS, or EKS clusters and want to know what kind of security risks they carry, you are invited to watch our talk Living off the Land Techniques in Managed Kubernetes Clusters. It sheds light on methods attackers can use to abuse existing services in managed Kubernetes clusters and reveals some cool attack chains generating from middleware components with which you might not be familiar. 

We highly recommend attending KubeCon Europe! And if you’re interested in more beginner-level information on Kubernetes, see our CloudSec Academy section on Kubernetes Security Best Practices, or download our guide to Kubernetes Security for Dummies

계속 읽기

맞춤형 데모 받기

맞춤형 데모 신청하기

“내가 본 최고의 사용자 경험은 클라우드 워크로드에 대한 완전한 가시성을 제공합니다.”
데이비드 에슬릭최고정보책임자(CISO)
“Wiz는 클라우드 환경에서 무슨 일이 일어나고 있는지 볼 수 있는 단일 창을 제공합니다.”
아담 플레처최고 보안 책임자(CSO)
“우리는 Wiz가 무언가를 중요한 것으로 식별하면 실제로 중요하다는 것을 알고 있습니다.”
그렉 포니아토프스키위협 및 취약성 관리 책임자