From the course: Securing Containers and Kubernetes Ecosystem

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Attack surface and vectors

Attack surface and vectors - Kubernetes Tutorial

From the course: Securing Containers and Kubernetes Ecosystem

Start my 1-month free trial

Attack surface and vectors

- [Teacher] Keeping this well synchronized ecosystem secure is going to be challenging, but before we can secure it, we need to understand what can actually go wrong. To do so, we will look at the attack surface of the containers and Kubernetes. The attack surface simply means the areas of a system that are one wonderful and can be exploited. A source code repository that contains the proprietary code may contain secrets. The secrets might be accidentally exposed. An attacker who gets access to your repository will automatically get access to your secrets, such as passwords, API keys, and database credentials, and access to those secrets opens the door to other parts of your system. The artifact repositories and container image registries, serve trusted objects and images to your developers and orchestrators. Unsecure connections, poor authentication and authorization practices can result in malicious actors getting…

Contents