filter >

Photo

Securing K8s: back and forth to RBAC Enforce

Roman Levkin

from Exness (Limassol)

About speaker

IT & ITSec folk who managed to look at the industry from different points of view: the integrator's, the vendor's and the customer's. Mostly on the "blue" side.

About speakers company

The leading multi-asset broker.

Abstracts

specific

The Great and Terrible – Access Control! And spiced up with a dash of YAML! Of course, you've heard about Role-Based Access Control (RBAC) in K8s, and you've probably seen more than one presentation about how it's implemented in Kubernetes API. But I invite you to dive deeper into what "configuring access in K8s" really means in practice:
- reality vs. theory: RBAC scope and limitations;
- other K8s-native controls and 3-party solutions for the rescue;
- access control and platform components: GitOps, monitoring, storage, cloud... you got the idea;
- the role of RBAC in building K8s multi-tenancy.
This is an intermediate-level technical talk, blending storytelling with practical tips and recommendations, aimed at helping you master this not the easiest, but one of the most powerful components of K8s security.

The talk was declined

other talks of this topic

Photo
How Kubernetes stores encrypted data in etcd, and why KMS v2 matters

Maksim Nabokikh

Principal Engineer at Palark GmbH

specific