Abusing Distroless containers: shell commands on shell-less containers, with Harsha Koushik
Description
In this KubeFM episode, Harsha explores the intricacies of Kubernetes security, focusing on the benefits and misconceptions of Distroless container images and the broader aspects of container security.
You will learn:
The advantages and limitations of Distroless container images: understand why these images are smaller, have a reduced attack surface and are not inherently secure.
Best practices for container security: gain insights into selecting base images, managing dependencies, and fortifying your infrastructure at every layer.
Supply chain security: explore how the supply chain can be an attack vector and the importance of signing artifacts and validating sources.
Emerging Kubernetes tools and future projects: discover the latest tools Harsha is monitoring and get a sneak peek into his upcoming projects, including a new podcast and a tool for simulating multistage attacks in cloud-native environments.
Sponsor
This episode is sponsored by Learnk8s — estimate the perfect cluster node with the Kubernetes Instance Calculator
More info
Find all the links and info for this episode here: https://kube.fm/abusing-distroless-harsha
Interested in sponsoring an episode? Learn more.
Xe Iaso shares their journey in building a "compute as a faucet" home lab where infrastructure becomes invisible and tasks can be executed without manual intervention. The discussion covers everything from operating system selection to storage architecture and secure access patterns.
You will...
Published 11/19/24
If you're trying to make sense of when to use Kubernetes and when to avoid it, this episode offers a practical perspective based on real-world experience running production workloads.
Paul Butler, founder of Jamsocket, discusses how to identify necessary vs unnecessary complexity in Kubernetes...
Published 11/12/24