Marc Nimmerrichter
Kubernetes Security - Challenge and Opportunity
#1about 3 minutes
A high-level overview of Kubernetes architecture
The core components of a Kubernetes cluster are explained, including the master node, worker nodes, etcd, API server, and kubelet.
#2about 3 minutes
Configuring workloads with Kubernetes objects
Key Kubernetes objects like pods, deployments, services, and volumes are introduced as the building blocks for configuring applications.
#3about 4 minutes
Managing access with namespaces and admission control
Namespaces are used to group resources, while authentication, authorization, and admission controllers provide granular access control through the API server.
#4about 7 minutes
How container isolation works in the Linux kernel
Containers achieve isolation using Linux kernel features like namespaces and cgroups, but share the host kernel, creating a different security model than VMs.
#5about 2 minutes
Deconstructing a typical Kubernetes cluster attack chain
An attacker can chain exploits, starting from an application vulnerability and escalating to a full container escape and cluster compromise.
#6about 4 minutes
Identifying common Kubernetes security vulnerabilities
Misconfigurations like privileged containers, disabled namespaces, and unpatched software in runtimes like runc create significant security risks.
#7about 6 minutes
Demonstrating a container escape via kernel exploit
A live demo shows how a kernel vulnerability like Dirty COW can be exploited to escape container isolation and gain root access on the host node.
#8about 4 minutes
The risks of RBAC and essential hardening measures
The `create pod` privilege is dangerously powerful, and security can be improved by enabling hardening measures like seccomp profiles and Pod Security Admission.
#9about 4 minutes
Addressing networking and multi-tenancy security challenges
Kubernetes network policies are essential for segmenting traffic, while true multi-tenancy is extremely risky and requires advanced solutions like hardened runtimes.
#10about 1 minute
Leveraging containerization for improved security posture
Despite the risks, containerization offers security advantages through small, understandable workloads that allow for tight security profiles and automated scanning.
#11about 3 minutes
Q&A on managed Kubernetes security in the cloud
The shared responsibility model in cloud Kubernetes services is discussed, highlighting that users must still explicitly enable many hardening features.
Related jobs
Jobs that call for the skills explored in this talk.
VECTOR Informatik
Stuttgart, Germany
Senior
Kubernetes
Terraform
+1
Power Plus Communications
Mannheim, Germany
Intermediate
Senior
Docker
Kubernetes
+2
Matching moments
01:06 MIN
Malware campaigns, cloud latency, and government IT theft
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
01:15 MIN
Crypto crime, EU regulation, and working while you sleep
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
05:01 MIN
Comparing the security models of browsers and native apps
Developer Time Is Valuable - Use the Right Tools - Kilian Valkhof
09:38 MIN
Technical challenges of shipping a cross-platform browser
Developer Time Is Valuable - Use the Right Tools - Kilian Valkhof
07:39 MIN
Prompt injection as an unsolved AI security problem
AI in the Open and in Browsers - Tarek Ziadé
06:33 MIN
The security challenges of building AI browser agents
AI in the Open and in Browsers - Tarek Ziadé
05:17 MIN
Europe's push for digital independence from US tech
WeAreDevelopers LIVE – AI, Freelancing, Keeping Up with Tech and More
05:55 MIN
The security risks of AI-generated code and slopsquatting
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
Featured Partners
Related Videos
Kubernetes Security Best Practices
Rico Komenda
Hacking Kubernetes: Live Demo Marathon
Andrew Martin
Turning Container security up to 11 with Capabilities
Mathias Tausig
Mastering Kubernetes – Beginner Edition
Hannes Norbert Göring
Chaos in Containers - Unleashing Resilience
Maish Saidel-Keesing
Enhancing Workload Security in Kubernetes
Dimitrij Klesev & Andreas Zeissner
Supply Chain Security and the Real World: Lessons From Incidents
Adrian Mouat
Local Development Techniques with Kubernetes
Rob Richardson
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

AllatNet Recruiting GmbH & Co. KG
GIT
Azure
Linux
DevOps
Docker
+8



Cloud Solutions
Frankfurt am Main, Germany
Go
Bash
Rust
Linux
Shell
+6

CompuSafe Data Systems AG
Berlin, Germany
Remote
Senior
Bash
Linux
Scrum
DevOps
+4


mund consulting AG
Stuttgart, Germany
Remote
Senior
DevOps
Docker
Kubernetes


ITERGO Informationstechnologie GmbH
Vienna, Austria
€44K
GIT
DevOps
Grafana
Prometheus
+3