DiscoverKubeFMAbusing Distroless containers: shell commands on shell-less containers, with Harsha Koushik
Abusing Distroless containers: shell commands on shell-less containers, with Harsha Koushik

Abusing Distroless containers: shell commands on shell-less containers, with Harsha Koushik

Update: 2024-08-27
Share

Description

In this KubeFM episode, Harsha explores the intricacies of Kubernetes security, focusing on the benefits and misconceptions of Distroless container images and the broader aspects of container security.

You will learn:

  • The advantages and limitations of Distroless container images: understand why these images are smaller, have a reduced attack surface and are not inherently secure.

  • Best practices for container security: gain insights into selecting base images, managing dependencies, and fortifying your infrastructure at every layer.

  • Supply chain security: explore how the supply chain can be an attack vector and the importance of signing artifacts and validating sources.

  • Emerging Kubernetes tools and future projects: discover the latest tools Harsha is monitoring and get a sneak peek into his upcoming projects, including a new podcast and a tool for simulating multistage attacks in cloud-native environments.

Sponsor

This episode is sponsored by Learnk8s — estimate the perfect cluster node with the Kubernetes Instance Calculator

More info

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Abusing Distroless containers: shell commands on shell-less containers, with Harsha Koushik

Abusing Distroless containers: shell commands on shell-less containers, with Harsha Koushik